Default Password Vulnerability in Milesight IP Security Cameras
CVE-2016-2360

9.8CRITICAL

Key Information:

Vendor

Milesight

Vendor
CVE Published:
25 October 2019

What is CVE-2016-2360?

Milesight IP security cameras, prior to November 14, 2016, are susceptible to security risks stemming from a default root password stored in the /etc/shadow file. This default password is identical across various installations, which may allow unauthorized access and control over the devices, potentially compromising user privacy and security. It is crucial for users to update their devices to mitigate this vulnerability.

Affected Version(s)

IP security cameras through 2016-11-14

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.