CVE-2023-28809

Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
hikvisionCNA
7.5 HIGH
NETWORK
HIGH
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
CVEADP
---
---
CISA-ADPADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 34%
VendorProductVersion
hikvisionds-k1t320efwx_firmware
-
hikvisionds-k1t320efx_firmware
-
hikvisionds-k1t320ewx_firmware
-
hikvisionds-k1t320ex_firmware
-
hikvisionds-k1t320mfwx_firmware
-
hikvisionds-k1t320mfx_firmware
-
hikvisionds-k1t320mwx_firmware
-
hikvisionds-k1t320mx_firmware
-
hikvisionds-k1t341am_firmware
-
hikvisionds-k1t341amf_firmware
-
hikvisionds-k1t341cm_firmware
-
hikvisionds-k1t343ewx_firmware
-
hikvisionds-k1t343ex_firmware
-
hikvisionds-k1t343mwx_firmware
-
hikvisionds-k1t343mx_firmware
-
hikvisionds-k1t671_firmware
-
hikvisionds-k1t671m_firmware
-
hikvisionds-k1t671mf_firmware
-
hikvisionds-k1t671t_firmware
-
hikvisionds-k1t671tm_firmware
-
hikvisionds-k1t671tm-3xf_firmware
-
hikvisionds-k1t671tmf_firmware
-
hikvisionds-k1t671tmfw_firmware
-
hikvisionds-k1t671tmw_firmware
-
hikvisionds-k1t804af_firmware
-
hikvisionds-k1t804amf_firmware
-
𝑥
= Vulnerable software versions