SERVER-WEBAPP -- Snort has detected traffic exploiting vulnerabilities in web based applications on servers.
SERVER-WEBAPP Dahua DVR DDNS configuration download attempt
This event is generated when a Dahua DVR, or potentially another DVR leveraging the same binary protocol, is being sent a request to download the DDNS configuration. At this time, requests sent over this protocol are unauthenticated. Impact: Attempted Information Leak Details: An attacker sends a command to the vulnerable DVR and since the request is unauthenticated, the DVR executes the request. In this case the request is to download the DDNS configuration. This configuration includes DDNS server and plaintext credentials. The rule looks for the following: 0xA3000000 -> Command dword 0x00000000 -> Null dword config -> Configuration request 0x00008C00 -> Specifier for which config (denotes DDNS) Ease of Attack: Simple and publicly available.
No information provided
No public information
No known false positives
Cisco Talos Intelligence Group
No rule groups
CVE-2013-3615 |
Loading description
|
CVE-2013-6117 |
Loading description
|