Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-3923 : Security Advisory and Response

Learn about CVE-2020-3923 involving TONNET DVR firmware vulnerability in TAT-76 and TAT-77 series products, allowing unauthorized access due to broken access control. Find mitigation steps and impacts here.

TONNET DVR – Broken Access Control

Understanding CVE-2020-3923

This CVE involves misconfigured authentication mechanisms in TONNET DVR firmware, allowing attackers to crack default passwords and access the system.

What is CVE-2020-3923?

The vulnerability in TONNET DVR firmware in TAT-76 and TAT-77 series products enables unauthorized access due to broken access control.

The Impact of CVE-2020-3923

The vulnerability has a CVSS base score of 8.1 (High severity) with significant impacts on confidentiality, integrity, and availability of affected systems.

Technical Details of CVE-2020-3923

Vulnerability Description

        TONNET DVR firmware in TAT-76 and TAT-77 series products has a misconfigured authentication mechanism.

Affected Systems and Versions

        Platforms: TAT-76 series, TAT-77 series
        Versions: <= 20191216 (TAT-76 series), <= 20200213 (TAT-77 series)

Exploitation Mechanism

        Attack Complexity: High
        Attack Vector: Network
        Privileges Required: None
        Scope: Unchanged
        User Interaction: None

Mitigation and Prevention

Immediate Steps to Take

        Update TAT-76 series to ver. 20191216
        Update TAT-77 series to ver. 20200213

Long-Term Security Practices

        Implement strong, unique passwords
        Regularly monitor and audit system access

Patching and Updates

        Apply vendor-provided patches promptly to address the vulnerability

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now