| Vulnerability Name: | CVE-2013-2572 (CCN-84573) | ||||||||||||
| Assigned: | 2013-05-28 | ||||||||||||
| Published: | 2013-05-28 | ||||||||||||
| Updated: | 2020-01-31 | ||||||||||||
| Summary: | A Security Bypass vulnerability exists in TP-LINK IP Cameras TL-SC 3130, TL-SC 3130G, 3171G, 4171G, and 3130 1.6.18P12 due to default hard-coded credentials for the administrative Web interface, which could let a malicious user obtain unauthorized access to CGI files. | ||||||||||||
| CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)
| ||||||||||||
| CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N) 3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
5.5 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||||||
| Vulnerability Type: | CWE-798 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2013-2572 Source: CCN Type: SA53485 TP-Link TL-SC3130 IP Camera Hardcoded Credential Security Issue Source: MISC Type: Exploit, Patch, Third Party Advisory, VDB Entry http://www.exploit-db.com/exploits/25812 Source: CCN Type: BID-60194 TP-Link IP Camera Hardcoded Credentials Security Bypass Vulnerability Source: MISC Type: Third Party Advisory, VDB Entry http://www.securityfocus.com/bid/60194 Source: CCN Type: TP-Link Web site IP camera Source: MISC Type: Third Party Advisory, VDB Entry https://exchange.xforce.ibmcloud.com/vulnerabilities/84573 Source: XF Type: UNKNOWN tplink-cve20132572-default-account(84573) Source: CCN Type: Packet Storm Security [05-28-2013] TP-Link IP Camera Hardcoded Credentials / Command Injection Source: MISC Type: Third Party Advisory, VDB Entry https://packetstormsecurity.com/files/cve/CVE-2013-2572 Source: MISC Type: Exploit, Patch, Third Party Advisory https://www.coresecurity.com/advisories/tp-link-ip-cameras-multiple-vulnerabilities Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [05-29-2013] | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration 4: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||