CVE-2023-38433
Summary
| CVE | CVE-2023-38433 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-07-26 08:15:00 UTC |
| Updated | 2023-11-07 04:17:00 UTC |
| Description | Fujitsu Real-time Video Transmission Gear "IP series" use hard-coded credentials, which may allow a remote unauthenticated attacker to initialize or reboot the products, and as a result, terminate the video transmission. Affected products and versions are as follows: IP-HE950E firmware versions V01L001 to V01L053, IP-HE950D firmware versions V01L001 to V01L053, IP-HE900E firmware versions V01L001 to V01L010, IP-HE900D firmware versions V01L001 to V01L004, IP-900E / IP-920E firmware versions V01L001 to V02L061, IP-900D / IP-900ⅡD / IP-920D firmware versions V01L001 to V02L061, IP-90 firmware versions V01L001 to V01L013, and IP-9610 firmware versions V01L001 to V02L007. |
Risk And Classification
Problem Types: CWE-798
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Fujitsu | Ip-90 | - | All | All | All |
| Hardware | Fujitsu | Ip-900d | - | All | All | All |
| Operating System | Fujitsu | Ip-900d Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-900e | - | All | All | All |
| Operating System | Fujitsu | Ip-900e Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-900iid | - | All | All | All |
| Operating System | Fujitsu | Ip-900iid Firmware | All | All | All | All |
| Operating System | Fujitsu | Ip-90 Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-920d | - | All | All | All |
| Operating System | Fujitsu | Ip-920d Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-920e | - | All | All | All |
| Operating System | Fujitsu | Ip-920e Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-9610 | - | All | All | All |
| Operating System | Fujitsu | Ip-9610 Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-he900d | - | All | All | All |
| Operating System | Fujitsu | Ip-he900d Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-he900e | - | All | All | All |
| Operating System | Fujitsu | Ip-he900e Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-he950d | - | All | All | All |
| Operating System | Fujitsu | Ip-he950d Firmware | All | All | All | All |
| Hardware | Fujitsu | Ip-he950e | - | All | All | All |
| Operating System | Fujitsu | Ip-he950e Firmware | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| JVN#95727578: Fujitsu Real-time Video Transmission Gear "IP series" uses a hard-coded credentials | MISC | jvn.jp | |
| Video Products - Fujitsu Global | MISC | www.fujitsu.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.