๐Ÿ” CVE Alert

CVE-2023-28809

HIGH 7.5
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th

Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.

CWE CWE-284
Vendor hikvision
Product ds-k1t804axx
Published Jun 15, 2023
Last Updated Dec 18, 2024
Stay Ahead of the Next One

Get instant alerts for hikvision ds-k1t804axx

Be the first to know when new high vulnerabilities affecting hikvision ds-k1t804axx are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Affected Versions

hikvision / DS-K1T804AXX
V1.4.0_build221212 < V1.4.0_build221212
hikvision / DS-K1T341AXX
V3.2.30_build221223 < V3.2.30_build221223
hikvision / DS-K1T671XXX
V3.2.30_build221223 < V3.2.30_build221223
hikvision / DS-K1T343XXX
V3.14.0_build230117 < V3.14.0_build230117
hikvision / DS-K1T341C
V3.3.8_build230112 < V3.3.8_build230112
hikvision / DS-K1T320XXX
V3.5.0_build220706 < V3.5.0_build220706

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
hikvision.com: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-access-control-intercom/ packetstormsecurity.com: http://packetstormsecurity.com/files/174506/Hikvision-Access-Control-Session-Hijacking.html

Credits

Andres Hinnosaar