We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-5634



Description

Longse model LBH30FE200W cameras, as well as products based on this device, make use of telnet passwords which follow a specific pattern. Once the pattern is known, brute-forcing the password becomes relatively easy.  Additionally, every camera with the same firmware version shares the same password.

Reserved 2024-06-04 | Published 2024-07-09 | Updated 2024-08-01 | Assigner CERT-PL


HIGH: 8.6CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-1391 Use of Weak Credentials

Product status

Default status
affected

Any version
affected

Default status
affected

Any version
affected

Credits

Adam Zambrzycki finder

References

zamel.com/...aw-monitoringu-bezprzewodowego-wi-fi-typ-zmb-01 product

cert.pl/en/posts/2024/07/CVE-2024-5631/ third-party-advisory

cert.pl/posts/2024/07/CVE-2024-5631/ third-party-advisory

cve.org (CVE-2024-5634)

nvd.nist.gov (CVE-2024-5634)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2024-5634

Support options

Helpdesk Chat, Email, Knowledgebase