Vulnerability Description
An improper authentication for critical function issue in Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder and Encoder) and bellow allows attckers to remotely reboot the device via a crafted POST request to the endpoint /ptipupgrade.cgi. Security information ID hitachi-sec-2022-001 contains fixes for the issue.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Hitachi | Hc-Ip9100Hd Firmware | <= 1.07 |
| Hitachi | Hc-Ip9100Hd | - |
Related Weaknesses (CWE)
References
- https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5
- https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec
- https://gist.github.com/Nwqda/5efea18c9142c6a966d85c6be2c0c2b5
- https://www.hitachi-kokusai.co.jp/global/en/products/info/vulnerable/hitachi-sec
FAQ
What is CVE-2022-37680?
CVE-2022-37680 is a vulnerability with a CVSS score of 7.5 (HIGH). An improper authentication for critical function issue in Hitachi Kokusai Electric Network products for monitoring system (Camera, Decoder and Encoder) and bellow allows attckers to remotely reboot th...
How severe is CVE-2022-37680?
CVE-2022-37680 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2022-37680?
Check the references section above for vendor advisories and patch information. Affected products include: Hitachi Hc-Ip9100Hd Firmware, Hitachi Hc-Ip9100Hd.