ID

VAR-201502-0478


CVE

CVE-2015-0930


TITLE

SerVision HVG Video Gateway web interface contains multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#522460

DESCRIPTION

The web interface on SerVision HVG Video Gateway devices with firmware before 2.2.26a100 has a hardcoded administrative password, which makes it easier for remote attackers to obtain access via an HTTP session. SerVision HVG Video Gateway is an intelligent video gateway product from SerVision, Israel. SerVision HVG is prone to a security-bypass vulnerability

Trust: 3.24

sources: NVD: CVE-2015-0930 // CERT/CC: VU#522460 // JVNDB: JVNDB-2015-001446 // CNVD: CNVD-2015-00903 // BID: 72433 // VULHUB: VHN-78876

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2015-00903

AFFECTED PRODUCTS

vendor:servisionmodel:hvg video gatewayscope:lteversion:2.2.26a100

Trust: 1.0

vendor:servisionmodel: - scope: - version: -

Trust: 0.8

vendor:servisionmodel:hvg 400scope: - version: -

Trust: 0.8

vendor:servisionmodel:hvg video gatewayscope:ltversion:2.2.26a100

Trust: 0.8

vendor:servisionmodel:hvg video gateway <2.2.26a100scope: - version: -

Trust: 0.6

vendor:servisionmodel:hvg video gatewayscope:eqversion:2.2.26a100

Trust: 0.6

sources: CERT/CC: VU#522460 // CNVD: CNVD-2015-00903 // JVNDB: JVNDB-2015-001446 // CNNVD: CNNVD-201502-047 // NVD: CVE-2015-0930

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2015-0930
value: HIGH

Trust: 1.0

NVD: CVE-2015-0930
value: HIGH

Trust: 0.8

CNVD: CNVD-2015-00903
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201502-047
value: CRITICAL

Trust: 0.6

VULHUB: VHN-78876
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2015-0930
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2015-00903
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-78876
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2015-00903 // VULHUB: VHN-78876 // JVNDB: JVNDB-2015-001446 // CNNVD: CNNVD-201502-047 // NVD: CVE-2015-0930

PROBLEMTYPE DATA

problemtype:CWE-255

Trust: 1.9

sources: VULHUB: VHN-78876 // JVNDB: JVNDB-2015-001446 // NVD: CVE-2015-0930

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201502-047

TYPE

trust management

Trust: 0.6

sources: CNNVD: CNNVD-201502-047

CONFIGURATIONS

sources: JVNDB: JVNDB-2015-001446

PATCH

title:Downloads - Get the latest software from SerVisionurl:http://www.servision.net/downloads/

Trust: 0.8

title:SerVision HVG Security Bypass Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/55045

Trust: 0.6

title:tvg_ti_HM4_2_2_26A100.tvxurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=53625

Trust: 0.6

sources: CNVD: CNVD-2015-00903 // JVNDB: JVNDB-2015-001446 // CNNVD: CNNVD-201502-047

EXTERNAL IDS

db:NVDid:CVE-2015-0930

Trust: 3.4

db:CERT/CCid:VU#522460

Trust: 3.3

db:BIDid:72433

Trust: 1.6

db:JVNid:JVNVU93153088

Trust: 0.8

db:JVNDBid:JVNDB-2015-001446

Trust: 0.8

db:CNNVDid:CNNVD-201502-047

Trust: 0.7

db:CNVDid:CNVD-2015-00903

Trust: 0.6

db:VULHUBid:VHN-78876

Trust: 0.1

sources: CERT/CC: VU#522460 // CNVD: CNVD-2015-00903 // VULHUB: VHN-78876 // BID: 72433 // JVNDB: JVNDB-2015-001446 // CNNVD: CNNVD-201502-047 // NVD: CVE-2015-0930

REFERENCES

url:http://www.kb.cert.org/vuls/id/522460

Trust: 2.5

url:http://www.securityfocus.com/bid/72433

Trust: 1.2

url:http://cwe.mitre.org/data/definitions/288.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/284.html

Trust: 0.8

url:http://cwe.mitre.org/data/definitions/259.html

Trust: 0.8

url:http://www.servision.net/downloads/

Trust: 0.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2015-0930

Trust: 0.8

url:http://jvn.jp/vu/jvnvu93153088/index.html

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2015-0930

Trust: 0.8

sources: CERT/CC: VU#522460 // CNVD: CNVD-2015-00903 // VULHUB: VHN-78876 // JVNDB: JVNDB-2015-001446 // CNNVD: CNNVD-201502-047 // NVD: CVE-2015-0930

CREDITS

Richard Tafoya

Trust: 0.9

sources: BID: 72433 // CNNVD: CNNVD-201502-047

SOURCES

db:CERT/CCid:VU#522460
db:CNVDid:CNVD-2015-00903
db:VULHUBid:VHN-78876
db:BIDid:72433
db:JVNDBid:JVNDB-2015-001446
db:CNNVDid:CNNVD-201502-047
db:NVDid:CVE-2015-0930

LAST UPDATE DATE

2025-04-12T23:04:51.554000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#522460date:2015-02-02T00:00:00
db:CNVDid:CNVD-2015-00903date:2015-02-05T00:00:00
db:VULHUBid:VHN-78876date:2015-02-04T00:00:00
db:BIDid:72433date:2015-02-02T00:00:00
db:JVNDBid:JVNDB-2015-001446date:2015-02-13T00:00:00
db:CNNVDid:CNNVD-201502-047date:2015-03-03T00:00:00
db:NVDid:CVE-2015-0930date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CERT/CCid:VU#522460date:2015-02-02T00:00:00
db:CNVDid:CNVD-2015-00903date:2015-02-05T00:00:00
db:VULHUBid:VHN-78876date:2015-02-03T00:00:00
db:BIDid:72433date:2015-02-02T00:00:00
db:JVNDBid:JVNDB-2015-001446date:2015-02-13T00:00:00
db:CNNVDid:CNNVD-201502-047date:2015-02-03T00:00:00
db:NVDid:CVE-2015-0930date:2015-02-03T22:59:03.940