Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Hikvision
Subscribe
|
Ds-k1t320efwx
Subscribe
Ds-k1t320efwx Firmware
Subscribe
Ds-k1t320efx
Subscribe
Ds-k1t320efx Firmware
Subscribe
Ds-k1t320ewx
Subscribe
Ds-k1t320ewx Firmware
Subscribe
Ds-k1t320ex
Subscribe
Ds-k1t320ex Firmware
Subscribe
Ds-k1t320mfwx
Subscribe
Ds-k1t320mfwx Firmware
Subscribe
Ds-k1t320mfx
Subscribe
Ds-k1t320mfx Firmware
Subscribe
Ds-k1t320mwx
Subscribe
Ds-k1t320mwx Firmware
Subscribe
Ds-k1t320mx
Subscribe
Ds-k1t320mx Firmware
Subscribe
Ds-k1t341am
Subscribe
Ds-k1t341am Firmware
Subscribe
Ds-k1t341amf
Subscribe
Ds-k1t341amf Firmware
Subscribe
Ds-k1t341cm
Subscribe
Ds-k1t341cm Firmware
Subscribe
Ds-k1t343ewx
Subscribe
Ds-k1t343ewx Firmware
Subscribe
Ds-k1t343ex
Subscribe
Ds-k1t343ex Firmware
Subscribe
Ds-k1t343mwx
Subscribe
Ds-k1t343mwx Firmware
Subscribe
Ds-k1t343mx
Subscribe
Ds-k1t343mx Firmware
Subscribe
Ds-k1t671
Subscribe
Ds-k1t671 Firmware
Subscribe
Ds-k1t671m
Subscribe
Ds-k1t671m Firmware
Subscribe
Ds-k1t671mf
Subscribe
Ds-k1t671mf Firmware
Subscribe
Ds-k1t671t
Subscribe
Ds-k1t671t Firmware
Subscribe
Ds-k1t671tm
Subscribe
Ds-k1t671tm-3xf
Subscribe
Ds-k1t671tm-3xf Firmware
Subscribe
Ds-k1t671tm Firmware
Subscribe
Ds-k1t671tmf
Subscribe
Ds-k1t671tmf Firmware
Subscribe
Ds-k1t671tmfw
Subscribe
Ds-k1t671tmfw Firmware
Subscribe
Ds-k1t671tmw
Subscribe
Ds-k1t671tmw Firmware
Subscribe
Ds-k1t804af
Subscribe
Ds-k1t804af Firmware
Subscribe
Ds-k1t804amf
Subscribe
Ds-k1t804amf Firmware
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32444 | Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user. |
Fixes
Solution
https://www.hikvision.com/en/support/download/firmware/
Workaround
No workaround given by the vendor.
References
History
Wed, 18 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: hikvision
Published:
Updated: 2024-12-18T16:24:05.385Z
Reserved: 2023-03-23T00:00:00
Link: CVE-2023-28809
Updated: 2024-08-02T13:51:38.488Z
Status : Modified
Published: 2023-06-15T19:15:10.537
Modified: 2024-11-21T07:56:03.600
Link: CVE-2023-28809
No data.
OpenCVE Enrichment
No data.
EUVD