Uniview considers cyber security as top priority. We believes that transparency and awareness are the keys to build strong cyber security. Recently, three cyber security related vulnerabilities are reported by individual security researcher Knud Højgaard. Uniview’s cyber security teams and R&D teams immediately investigated the situation, developed a patch upgrade that fixes the vulnerabilities.
Uniview recognizes and values the importance of data and cyber security, and will spare no time to keep them safe for our customers. A team of experts and professionals here at Uniview are responsible for keeping close monitor to any potential vulnerability on a regular basis. Strict procedures and regulations have been applied to ensure timely notification and fast responses if any vulnerability is spotted.
Meanwhile, please upgrade to the patched version, do not hestitate to contact the equipment purchase channel, Uniview 400 hotline or regional after-sales service personnel if you need any help.
For products with cloud upgrade capability, related repair versions can be obtained through cloud upgrade.
SA ID: USRC-202208-01
Summary
The following security vulnerabilities are found in certain products.
Vulnerability 1: Device credentials can be modified via SNMP port (UDP port 161).
Risk evaluated: This port will not be automatically mapped to the Internet. Unless user manually maps this port to the Internet on the Internet router or other networking device, exploiting this vulnerability to attack devices in the local area network (LAN) or private network from the Internet is impossible.
Vulnerability 2: The password retrieval function in some old versions is flawed and can be used by hackers to hijack the affected devices.
Vulnerability evaluated: Direct attack by exploiting the flaw from the Internet is impossible for devices in the local area network (LAN) or private network.
Vulnerability 3: There is a command execution vulnerability in the NAS test function after user logs in to device’s web interface.
Vulnerability evaluated: The vulnerability can be exploited only after the attacker passes user authentication. It cannot be directly used to attack devices on the Internet, local area network (LAN) and private network.
Vulnerability score:
CVSS v3 is adopted in this vulnerability scoring (http://www.first.org/cvss/specification-document)
Vulnerability 1:
Base score: 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N)
Temporal score: 7.7 (E:P/RL:O/RC:R)
Vulnerability 2:
Base score: 8.1 (AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H)
Temporal score: 7.3 (E:P/RL:O/RC:R)
Vulnerability 3:
Base score: 8.0 (AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H)
Temporal score: 7.2 (E:P/RL:O/RC:R)
Affected Versions and Fixed Versions
Vulnerability 1:
Affected Version | Fixed Version |
---|---|
QIPC-B9101.7.8.211207 and earlier | QIPC-B9101.8.3.220209 and later |
QIPC-B8701.10.7.211105 and earlier | QIPC-B8701.11.3.220209 and later |
QIPC-B6302.2.10.211105 and earlier | QIPC-B6302.5.6.220304 and later |
QIPC-B6301.9.11.211105 and earlier | QIPC-B6301.11.3.220209 and later |
QIPC-B2202.3.75.211207 and earlier | QIPC-B2202.5.8.220304 and later |
QIPC-B2201.10.7.211105 and earlier | QIPC-B2201.11.6.220304 and later |
QIPC-B1208.7.7.210705 and earlier | QIPC-B1208.7.9.220415 and later |
QIPC-R1207.8.37.211122 and earlier | QIPC-R1207.8.39.220415 and later |
QIPC-R1206.9.36.211122 and earlier | QIPC-R1206.9.38.220415 and later |
QIPC-B1203.16.8.211105 and earlier | QIPC-B1203.16.10.220415 and later |
QIPC-R1201.30.38.211122 and earlier | QIPC-R1201.30.41.220415 and later |
HCMN-B2201.6.7.210705 and earlier | HCMN-B2201.6.9.220415 and later |
HCMN-R2108.13.37.211122 and earlier | HCMN-R2108.13.39.220415 and later |
HCMN-R2103.28.38.211122 and earlier | HCMN-R2103.28.41.220415 and later |
GIPC-B6106.8.42.211122 and earlier | GIPC-B6106.8.47.220427 and later |
GIPC-B6103.16.37.211122 and earlier | GIPC-B6103.16.39.220416 and later |
GIPC-B6102.26.41.211122 and earlier | GIPC-B6102.26.43.220415 and later |
CIPC-B2302.3.65.211102 and earlier | CIPC-B2302.5.8.220304 and later |
CIPC-B2301.5.37.211122 and earlier | CIPC-B2301.5.39.220415 and later |
GIPC-B6206.1.69.211220 and earlier | GIPC-B6206.1.70.220309 and later |
IPC_G6107-B0001P99D1806 and earlier | IPC_G6107-B0002P61D1806 and later |
GIPC-B6202.5.79.211217 and earlier | GIPC-B6202.5.82.220121 and later |
GIPC-B6203.3.79.211217 and earlier | GIPC-B6203.3.82.220121 and later |
DIPC-B1213.2.67.211221 and earlier | DIPC-B1213.2.70.220329 and later |
DIPC-B1216.2.65.211220 and earlier | DIPC-B1216.2.71.220324 and later |
DIPC-B1221.1.77.220218 and earlier | DIPC-B1221.1.80.220329 and later |
DIPC-B1222.1.67.211222 and earlier | DIPC-B1222.1.70.220317 and later |
DIPC-B1223.1.78.211209 and earlier | DIPC-B1223.1.81.220402 and later |
DIPC-B1225.1.67.211210 and earlier | DIPC-B1225.1.69.220329 and later |
DIPC-B1226.1.61.220121 and earlier | DIPC-B1226.1.66.220317 and later |
DIPC-B1219.1.87.211213 and earlier | DIPC-B1219.1.92.220228 and later |
Vulnerability 2:
Affected Version | Fixed Version |
---|---|
QIPC-R1207.8.37.211122 and earlier | QIPC-R1207.8.39.220415 and later |
QIPC-R1206.9.36.211122 and earlier | QIPC-R1206.9.38.220415 and later |
QIPC-R1201.30.38.211122 and earlier | QIPC-R1201.30.41.220415 and later |
HCMN-R2108.13.37.211122 and earlier | HCMN-R2108.13.39.220415 and later |
HCMN-R2103.28.38.211122 and earlier | HCMN-R2103.28.41.220415 and later |
GIPC-B6106.8.42.211122 and earlier | GIPC-B6106.8.47.220427 and later |
GIPC-B6103.16.37.211122 and earlier | GIPC-B6103.16.39.220416 and later |
GIPC-B6102.26.41.211122 and earlier | GIPC-B6102.26.43.220415 and later |
CIPC-B2301.5.37.211122 and earlier | CIPC-B2301.5.39.220415 and later |
DIPC-B1213.2.67.211221 and earlier | DIPC-B1213.2.70.220329 and later |
DIPC-B1216.2.65.211220 and earlier | DIPC-B1216.2.71.220324 and later |
DIPC-B1221.1.77.220218 and earlier | DIPC-B1221.1.80.220329 and later |
DIPC-B1222.1.67.211222 and earlier | DIPC-B1222.1.70.220317 and later |
DIPC-B1223.1.78.211209 and earlier | DIPC-B1223.1.81.220402 and later |
DIPC-B1225.1.67.211210 and earlier | DIPC-B1225.1.69.220329 and later |
DIPC-B1226.1.61.220121 and earlier | DIPC-B1226.1.66.220317 and later |
IPC_D1202-B0007P77D1904 and earlier | IPC_D1202-B0007P79D1904 and later |
IPC_G6107-B0001P99D1806 and earlier | IPC_G6107-B0002P61D1806 and later |
Vulnerability 3:
Affected Version | Fixed Version |
---|---|
QIPC-B9101.7.8.211207 and earlier | QIPC-B9101.8.3.220209 and later |
QIPC-B8701.10.7.211105 and earlier | QIPC-B8701.11.3.220209 and later |
QIPC-B6302.2.10.211105 and earlier | QIPC-B6302.5.6.220304 and later |
QIPC-B6301.9.11.211105 and earlier | QIPC-B6301.11.3.220209 and later |
QIPC-B2202.3.75.211207 and earlier | QIPC-B2202.5.8.220304 and later |
QIPC-B2201.10.7.211105 and earlier | QIPC-B2201.11.6.220304 and later |
QIPC-B1208.7.7.210705 and earlier | QIPC-B1208.7.9.220415 and later |
QIPC-R1207.8.37.211122 and earlier | QIPC-R1207.8.39.220415 and later |
QIPC-R1206.9.36.211122 and earlier | QIPC-R1206.9.38.220415 and later |
QIPC-B1203.16.8.211105 and earlier | QIPC-B1203.16.10.220415 and later |
QIPC-R1201.30.38.211122 and earlier | QIPC-R1201.30.41.220415 and later |
HCMN-B2201.6.7.210705 and earlier | HCMN-B2201.6.9.220415 and later |
HCMN-R2108.13.37.211122 and earlier | HCMN-R2108.13.39.220415 and later |
HCMN-R2103.28.38.211122 and earlier | HCMN-R2103.28.41.220415 and later |
GIPC-B6106.8.42.211122 and earlier | GIPC-B6106.8.47.220427 and later |
GIPC-B6103.16.37.211122 and earlier | GIPC-B6103.16.39.220416 and later |
GIPC-B6102.26.41.211122 and earlier | GIPC-B6102.26.43.220415 and later |
CIPC-B2302.3.65.211102 and earlier | CIPC-B2302.5.8.220304 and later |
CIPC-B2301.5.37.211122 and earlier | CIPC-B2301.5.39.220415 and later |
GIPC-B6202.5.82.220121 and earlier | GIPC-B6202.5.88.220329 and later |
GIPC-B6203.3.82.220121 and earlier | GIPC-B6203.3.88.220329 and later |
DIPC-B1213.2.67.211221 and earlier | DIPC-B1213.2.70.220329 and later |
DIPC-B1216.2.65.211220 and earlier | DIPC-B1216.2.71.220324 and later |
DIPC-B1221.1.77.220218 and earlier | DIPC-B1221.1.80.220329 and later |
DIPC-B1222.1.67.211222 and earlier | DIPC-B1222.1.70.220317 and later |
DIPC-B1223.1.78.211209 and earlier | DIPC-B1223.1.81.220402 and later |
DIPC-B1225.1.67.211210 and earlier | DIPC-B1225.1.69.220329 and later |
DIPC-B1226.1.61.220121 and earlier | DIPC-B1226.1.66.220317 and later |
GIPC-B6206.1.69.211220 and earlier | GIPC-B6206.1.70.220309 and later |
IPC_D1202-B0007P77D1904 and earlier | IPC_D1202-B0007P79D1904 and later |
IPC_D1203-B0003P73D1812 and earlier | IPC_D1203-B0003P75D1812 and later |
IPC_G6107-B0001P99D1806 and earlier | IPC_G6107-B0002P61D1806 and later |
IPC_G6108-B0001P83D1809 and earlier | IPC_G6108-B0001P86D1809 and later |
Obtaining fixed version:
Please obtain the fixed version and upgrade, please contact the distribution channel, Service Hotline or regional technical support for help.
- Service Hotline/ regional technical support: https://global.uniview.com/About_Us/Contact_Us/
- If the device supports cloud upgrade, you may also upgrade the version by cloud.
Acknowledgment
We thank the support of individual security researcher Knud Højgaard who discovered these vulnerabilities and reported to Uniview.
Contact us:
Should you have any security issues or concerns with our products, please contact us at security@uniview.com