Summary
Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources.
Credit:
The information has been provided by Vendor
The original article can be found at:https://www.dahuasecurity.com/support/cybersecurity/details/757
Details
Attackers can obtain Cloud Key information from the Dahua Web P2P control in specific ways. Cloud Key is used to authenticate the connection between the client tool and the platform. An attacker may use the leaked Cloud Key to impersonate the client to connect to the platform, resulting in additional consumption of platform server resources. Versions with Build time before April 2020 are affected.
Vulnerable Systems:
Dahua Web P2P
CVE Information:
Disclosure Timeline:
Published Date:5/13/2020