SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Dahua DVR email configuration download attempt
This event is generated when a Dahua DVR, or potentially another DVR leveraging the same binary protocol, is being sent a request to download the email configuration. At this time, requests sent over this protocol are unauthenticated. Impact: Attempted Information Leak Details: An attacker sends a command to the vulnerable DVR and since the request is unauthenticated, the DVR executes the request. In this case the request is to download the email configuration. This configuration includes SMTP server and plaintext credentials. The rule looks for the following: 0xA3000000 -> Command dword 0x00000000 -> Null dword config -> Configuration request 0x00000B00 -> Specifier for which config (denotes email) Ease of Attack: Simple and publicly available.
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2013-3615 |
Loading description
|
CVE-2013-6117 |
Loading description
|