{ "schema_version": "1.4.0", "id": "GHSA-c2vq-prj2-mrqc", "modified": "2022-05-13T01:36:15Z", "published": "2022-05-13T01:36:15Z", "aliases": [ "CVE-2017-7927" ], "details": "A Use of Password Hash Instead of Password for Authentication issue was discovered in Dahua DH-IPC-HDBW23A0RN-ZS, DH-IPC-HDBW13A0SN, DH-IPC-HDW1XXX, DH-IPC-HDW2XXX, DH-IPC-HDW4XXX, DH-IPC-HFW1XXX, DH-IPC-HFW2XXX, DH-IPC-HFW4XXX, DH-SD6CXX, DH-NVR1XXX, DH-HCVR4XXX, DH-HCVR5XXX, DHI-HCVR51A04HE-S3, DHI-HCVR51A08HE-S3, and DHI-HCVR58A32S-S2 devices. The use of password hash instead of password for authentication vulnerability was identified, which could allow a malicious user to bypass authentication without obtaining the actual password.", "severity": [ { "type": "CVSS_V3", "score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L" } ], "affected": [], "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2017-7927" }, { "type": "WEB", "url": "https://ics-cert.us-cert.gov/advisories/ICSA-17-124-02" }, { "type": "WEB", "url": "http://us.dahuasecurity.com/en/us/Security-Bulletin_030617.php" }, { "type": "WEB", "url": "http://www.securityfocus.com/bid/98312" } ], "database_specific": { "cwe_ids": [ "CWE-798", "CWE-836" ], "severity": "HIGH", "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2017-05-06T00:29:00Z" } }