Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.

Project Subscriptions

Vendors Products
Hikvision Subscribe
Ds-k1t320efwx Subscribe
Ds-k1t320efwx Firmware Subscribe
Ds-k1t320efx Subscribe
Ds-k1t320efx Firmware Subscribe
Ds-k1t320ewx Subscribe
Ds-k1t320ewx Firmware Subscribe
Ds-k1t320ex Subscribe
Ds-k1t320ex Firmware Subscribe
Ds-k1t320mfwx Subscribe
Ds-k1t320mfwx Firmware Subscribe
Ds-k1t320mfx Subscribe
Ds-k1t320mfx Firmware Subscribe
Ds-k1t320mwx Subscribe
Ds-k1t320mwx Firmware Subscribe
Ds-k1t320mx Subscribe
Ds-k1t320mx Firmware Subscribe
Ds-k1t341am Subscribe
Ds-k1t341am Firmware Subscribe
Ds-k1t341amf Subscribe
Ds-k1t341amf Firmware Subscribe
Ds-k1t341cm Subscribe
Ds-k1t341cm Firmware Subscribe
Ds-k1t343ewx Subscribe
Ds-k1t343ewx Firmware Subscribe
Ds-k1t343ex Subscribe
Ds-k1t343ex Firmware Subscribe
Ds-k1t343mwx Subscribe
Ds-k1t343mwx Firmware Subscribe
Ds-k1t343mx Subscribe
Ds-k1t343mx Firmware Subscribe
Ds-k1t671 Subscribe
Ds-k1t671 Firmware Subscribe
Ds-k1t671m Subscribe
Ds-k1t671m Firmware Subscribe
Ds-k1t671mf Subscribe
Ds-k1t671mf Firmware Subscribe
Ds-k1t671t Subscribe
Ds-k1t671t Firmware Subscribe
Ds-k1t671tm Subscribe
Ds-k1t671tm-3xf Subscribe
Ds-k1t671tm-3xf Firmware Subscribe
Ds-k1t671tm Firmware Subscribe
Ds-k1t671tmf Subscribe
Ds-k1t671tmf Firmware Subscribe
Ds-k1t671tmfw Subscribe
Ds-k1t671tmfw Firmware Subscribe
Ds-k1t671tmw Subscribe
Ds-k1t671tmw Firmware Subscribe
Ds-k1t804af Subscribe
Ds-k1t804af Firmware Subscribe
Ds-k1t804amf Subscribe
Ds-k1t804amf Firmware Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-32444 Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
Fixes

Solution

https://www.hikvision.com/en/support/download/firmware/


Workaround

No workaround given by the vendor.

History

Wed, 18 Dec 2024 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: hikvision

Published:

Updated: 2024-12-18T16:24:05.385Z

Reserved: 2023-03-23T00:00:00

Link: CVE-2023-28809

cve-icon Vulnrichment

Updated: 2024-08-02T13:51:38.488Z

cve-icon NVD

Status : Modified

Published: 2023-06-15T19:15:10.537

Modified: 2024-11-21T07:56:03.600

Link: CVE-2023-28809

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses