CVE-2023-38433

Severity CVSS v4.0:
Pending analysis
Type:
CWE-798 Use of Hard-coded Credentials
Publication date:
26/07/2023
Last modified:
07/11/2023

Description

Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:fujitsu:ip-he950e_firmware:*:*:*:*:*:*:*:* v01l001 (including) v01l053 (including)
cpe:2.3:h:fujitsu:ip-he950e:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he950d_firmware:*:*:*:*:*:*:*:* v01l001 (including) v01l053 (including)
cpe:2.3:h:fujitsu:ip-he950d:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he900e_firmware:*:*:*:*:*:*:*:* v01l001 (including) v01l010 (including)
cpe:2.3:h:fujitsu:ip-he900e:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-he900d_firmware:*:*:*:*:*:*:*:* v01l001 (including) v01l004 (including)
cpe:2.3:h:fujitsu:ip-he900d:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-900e_firmware:*:*:*:*:*:*:*:* v01l001 (including) v02l061 (including)
cpe:2.3:h:fujitsu:ip-900e:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-920e_firmware:*:*:*:*:*:*:*:* v01l001 (including) v02l061 (including)
cpe:2.3:h:fujitsu:ip-920e:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-900d_firmware:*:*:*:*:*:*:*:* v01l001 (including) v02l061 (including)
cpe:2.3:h:fujitsu:ip-900d:-:*:*:*:*:*:*:*
cpe:2.3:o:fujitsu:ip-900iid_firmware:*:*:*:*:*:*:*:* v01l001 (including) v02l061 (including)