Description
Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
Problem types
CWE-521 Weak Password Requirements
CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Product status
2.3.5
References
www.cnvd.org.cn/flaw/show/CNVD-2021-14544
blog.csdn.net/qq_40684306/article/details/115278837
www.hikvision.com/...upport/cybersecurity/security-advisory/
vulncheck.com/...on-streaming-server-default-creds-file-read