Vulnerability Description
Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability that allows attackers on the local network to reset the device's administrator password. This affects products marketed under the following brand names: Accfly, Alptop, Anlink, Besdersec, BOAVISION, COOAU, CPVAN, Ctronics, D3D Security, Dericam, Elex System, Elite Security, ENSTER, ePGes, Escam, FLOUREON, GENBOLT, Hongjingtian (HJT), ICAMI, Iegeek, Jecurity, Jennov, KKMoon, LEFTEK, Loosafe, Luowice, Nesuniq, Nettoly, ProElite, QZT, Royallite, SDETER, SV3C, SY2L, Tenvis, ThinkValue, TOMLOV, TPTEK, WGCC, and ZILINK.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hichip | Shenzhen Hichip Vision Technology Firmware | < 2020-06-29 |
References
- https://hacked.camera/Not Applicable
- https://redprocyon.comNot Applicable
- https://hacked.camera/Not Applicable
- https://redprocyon.comNot Applicable
FAQ
What is CVE-2020-9529?
CVE-2020-9529 is a vulnerability with a CVSS score of 9.8 (CRITICAL). Firmware developed by Shenzhen Hichip Vision Technology (V6 through V20), as used by many different vendors in millions of Internet of Things devices, suffers from a privilege escalation vulnerability...
How severe is CVE-2020-9529?
CVE-2020-9529 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2020-9529?
Check the references section above for vendor advisories and patch information. Affected products include: Hichip Shenzhen Hichip Vision Technology Firmware.