CVE-2023-28809
CVSS Score
7.5
EPSS Score
0.0%
EPSS Percentile
0th
Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
| CWE | CWE-284 |
| Vendor | hikvision |
| Product | ds-k1t804axx |
| Published | Jun 15, 2023 |
| Last Updated | Dec 18, 2024 |
Stay Ahead of the Next One
Get instant alerts for hikvision ds-k1t804axx
Be the first to know when new high vulnerabilities affecting hikvision ds-k1t804axx are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Affected Versions
hikvision / DS-K1T804AXX
V1.4.0_build221212 < V1.4.0_build221212
hikvision / DS-K1T341AXX
V3.2.30_build221223 < V3.2.30_build221223
hikvision / DS-K1T671XXX
V3.2.30_build221223 < V3.2.30_build221223
hikvision / DS-K1T343XXX
V3.14.0_build230117 < V3.14.0_build230117
hikvision / DS-K1T341C
V3.3.8_build230112 < V3.3.8_build230112
hikvision / DS-K1T320XXX
V3.5.0_build220706 < V3.5.0_build220706
References
Credits
Andres Hinnosaar