Weak Encryption in Shenzen Tenda Technology IP Camera Leads to Default Password Vulnerability
CVE-2023-30351
7.5HIGH
Summary
The Shenzen Tenda Technology CP3 IP camera has been identified to possess a significant authentication issue due to a hard-coded default password for the root user. This password is stored using weak encryption, making it susceptible to unauthorized access. Attackers can exploit this vulnerability to connect to the TELNET service or UART, potentially leading to a breach of sensitive information and control over the device. Users are advised to change default credentials and implement stronger security measures to safeguard their devices.
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved