Trusted Design

DVR Firmware for multiple vendors contains hard-coded creds

概要

CWE-259: Use of Hard-coded Password - CVE-2015-8286 According to the reporter, DVR devices based on the Zhuhai RaySharp firmware contain a hard-coded root password. Remote attackers with knowledge of the password may gain root access to the device. Furthermore, it was previously reported publicly that many of these devices enable remote access via telnet or port 9000 by default. The CERT/CC has not been able to confirm this information directly with Zhuhai RaySharp. The Vendor List below provides more information on each manufacturer that was reported to be vulnerable. The reporter, Risk Based Security, has provided security advisory RBS-2016-001 with more information

Created: 2026-02-23

Indicators

Indicatorsは見つかっていない。

類似Pulses

このPulseに関連する脅威アクター (事実ベース)

APT28

Score: 14.27
Matched TTPs:
  • T1110.001 - Password Guessing
  • T1190 - Exploit Public-Facing Application
  • T1669 - Wi-Fi Networks
  • T1211 - Exploitation for Defense Evasion
MITREへのリンク →

APT29

Score: 5.60
Matched TTPs:
  • T1110.001 - Password Guessing
  • T1190 - Exploit Public-Facing Application
MITREへのリンク →

FIN7

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Volt Typhoon

Score: 5.95
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
  • T1680 - Local Storage Discovery
MITREへのリンク →

Kimsuky

Score: 5.95
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
  • T1680 - Local Storage Discovery
MITREへのリンク →

Ember Bear

Score: 5.09
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1078.001 - Default Accounts
MITREへのリンク →

FIN13

Score: 6.74
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1078.001 - Default Accounts
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Magic Hound

Score: 6.74
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1078.001 - Default Accounts
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Medusa Group

Score: 5.86
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1573.002 - Asymmetric Cryptography
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Fox Kitten

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

BlackByte

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Agrius

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

menuPass

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

ToddyCat

Score: 4.30
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1680 - Local Storage Discovery
MITREへのリンク →

Blue Mockingbird

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Leviathan

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

INC Ransom

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

UNC3886

Score: 5.09
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1078.001 - Default Accounts
MITREへのリンク →

Dragonfly

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Axiom

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT41

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT5

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

APT39

Score: 3.12
Matched TTPs:
  • T1190 - Exploit Public-Facing Application
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Gamaredon Group

Score: 4.54
Matched TTPs:
  • T1001 - Data Obfuscation
MITREへのリンク →

Velvet Ant

Score: 6.88
Matched TTPs:
  • T1573.002 - Asymmetric Cryptography
  • T1211 - Exploitation for Defense Evasion
MITREへのリンク →

Tropic Trooper

Score: 5.58
Matched TTPs:
  • T1573.002 - Asymmetric Cryptography
  • T1680 - Local Storage Discovery
MITREへのリンク →

OilRig

Score: 4.39
Matched TTPs:
  • T1573.002 - Asymmetric Cryptography
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Cobalt Group

Score: 4.39
Matched TTPs:
  • T1573.002 - Asymmetric Cryptography
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

FIN6

Score: 4.39
Matched TTPs:
  • T1573.002 - Asymmetric Cryptography
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

FIN8

Score: 4.39
Matched TTPs:
  • T1573.002 - Asymmetric Cryptography
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Scattered Spider

Score: 6.19
Matched TTPs:
  • T1538 - Cloud Service Dashboard
  • T1021.001 - Remote Desktop Protocol
MITREへのリンク →

Patchwork

Score: 4.48
Matched TTPs:
  • T1021.001 - Remote Desktop Protocol
  • T1680 - Local Storage Discovery
MITREへのリンク →

Lazarus Group

Score: 4.48
Matched TTPs:
  • T1021.001 - Remote Desktop Protocol
  • T1680 - Local Storage Discovery
MITREへのリンク →

Chimera

Score: 4.48
Matched TTPs:
  • T1021.001 - Remote Desktop Protocol
  • T1680 - Local Storage Discovery
MITREへのリンク →

このPulseに関連する脅威アクター (推論ベース)

APT28

Score: 0.78
Matched TTPs:
  • T1669 - Wi-Fi Networks
  • T1190 - Exploit Public-Facing Application
  • T1211 - Exploitation for Defense Evasion
  • T1110.001 - Password Guessing
MITREへのリンク →

Related CVEs

Pulse – 脅威アクター グラフ


← Pulse一覧に戻る