SA ID:USRC-202112-01
First Published:2021-12-22
Summary:
A buffer overflow vulnerability found in the 7788 UDP port of some Uniview products.
CVE ID:CVE-2021-45039
Scoring:
CVSS v3 is adopted in this vulnerability scoring(http://www.first.org/cvss/specification-document)
Base score: 8.9 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H)
Temporal score: 7.7 (E:P/RL:O/RC:R)
Risks Evaluated:
To exploit this vulnerability, an attacker shall have access to 7788 UDP port of the device, otherwise the attack is impossible.
Please check if 7788 UDP port of the affected device is exposed directly to the Internet (WAN), which would give a potential attacker the ability to attack the device from the Internet.
For a device behind a router or a firewall, the router or the firewall will not map the vulnerable port (7788 UDP port) automatically or open it by default. So, so long as 7788 UDP port of the device is not mapped manually to the WAN, the device is not directly exposed to malicious attacks from the Internet.
Devices on the local area network (LAN) will not be directly attacked from the Internet.
Please configure your router or firewall to open a minimum set of ports to the internet (WAN) and keep only the necessary port mappings. Never set the device as the DMZ host or configure a full cone NAT.
Affected versions and fixed version:
Affected Version | Fixed Version |
---|---|
QIPC-B9101.6.7.210705 and earlier versions | QIPC-B9101.7.8.211207 and later |
QIPC-B8701.9.7.210705 and earlier versions | QIPC-B8701.10.7.211105 and later |
IPC_Q6303-B0001P67D1907 and earlier versions | IPC_Q6303-B0001P68D1907 and later |
QIPC-B6302.2.8.210907 and earlier versions | QIPC-B6302.2.10.211105 and later |
QIPC-B6301.9.9.210828 and earlier versions | QIPC-B6301.9.11.211105 and later |
QIPC-B2202.3.35.210928 and earlier versions | QIPC-B2202.3.65.211102 and later |
QIPC-B2201.9.12.210827 and earlier versions | QIPC-B2201.10.7.211105 and later |
QIPC-B1208.7.7.210705 and earlier versions | QIPC-B1208.8.7.211105 and later |
QIPC-R1207.8.35.210705 and earlier versions | QIPC-R1207.8.37.211122 and later |
QIPC-R1206.9.32.210705 and earlier versions | QIPC-R1206.9.36.211122 and later |
QIPC-B1203.16.7.210708 and earlier versions | QIPC-B1203.16.8.211105 and later |
QIPC-R1201.30.36.210705 and earlier versions | QIPC-R1201.30.38.211122 and later |
HCMN-B2201.6.7.210705 and earlier versions | HCM-B2201.7.7.211105 and later |
HCMN-R2108.13.35.210705 and earlier versions | HCMN-R2108.13.37.211122 and later |
HCMN-R2103.28.36.210705 and earlier versions | HCMN-R2103.28.38.211122 and later |
GIPC-B6106.8.40.210705 and earlier versions | GIPC-B6106.8.42.211122 and later |
GIPC-B6103.16.35.210705 and earlier versions | GIPC-B6103.16.37.211122 and later |
GIPC-B6102.26.39.210705 and earlier versions | GIPC-B6102.26.41.211122 and later |
CIPC-B2302.3.35.210928 and earlier versions | CIPC-B2302.3.65.211102 and later |
CIPC-B2301.5.35.210705 and earlier versions | CIPC-B2301.5.37.211122 and later |
GIPC-B6202.5.38.211015 and earlier versions | GIPC-B6202.5.65.211028 and later |
GIPC-B6203.3.33.210924 and earlier versions | GIPC-B6203.3.65.211028 and later |
GIPC-B6110.5.6.210701 and earlier versions | GIPC-B6110.5.10.211118 and later |
DIPC-B1209.6.6.210701 and earlier versions | DIPC-B1209.6.10.211118 and later |
DIPC-B1211.6.12.210922 and earlier versions | DIPC-B1211.6.15.211118 and later |
DIPC-B1213.2.62.210930 and earlier versions | DIPC-B1213.2.66.211210 and later |
DIPC-B1216.2.60.210922 and earlier versions | DIPC-B1216.2.63.211208 and later |
DIPC-B1221.1.69.211103 and earlier versions | DIPC-B1221.1.72.211210 and later |
DIPC-B1222.1.62.210729 and earlier versions | DIPC-B1222.1.66.211210 and later |
DIPC-B1223.1.72.211029 and earlier versions | DIPC-B1223.1.78.211209 and later |
DIPC-B1225.1.63.211021 and earlier versions | DIPC-B1225.1.67.211210 and later |
IPC_G6107-B0001P97D1806 and earlier versions | IPC_G6107-B0001P99D1806 and later |
ANPR-B1101.3.3.210712 and earlier versions | ANPR-B1101.3.3.L01.211101 and later |
QPTS-B2209.3.71.CLA002.210413 and earlier versions | QPTS-B2209.3.71.CLA005.211210 and later |
Precondition:
The attacker has access to 7788 udp port of the device.
Attack step:
Send a specially crafted message.
Obtaining fixed firmware:
Please use the repair versions for update. You may contact the distribution channel, Service Hotline or regional technical support for help.
Service Hotline/regional technical support:https://global.uniview.com/About_Us/Contact_Us/
Uniview products have the capability of cloud upgrade. Relevant repair versions can be obtained through cloud upgrade.
Source of vulnerability information:
Thank SSD Secure Disclosure for reporting this vulnerability.
Contact Us:
Should you have any security issues or concerns with our products or solutions, please contact us at security@uniview.com.