Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-32444 | Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user. |
Fixes
Solution
https://www.hikvision.com/en/support/download/firmware/
Workaround
No workaround given by the vendor.
References
History
Wed, 18 Dec 2024 17:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: hikvision
Published:
Updated: 2024-12-18T16:24:05.385Z
Reserved: 2023-03-23T00:00:00
Link: CVE-2023-28809

Updated: 2024-08-02T13:51:38.488Z

Status : Modified
Published: 2023-06-15T19:15:10.537
Modified: 2024-11-21T07:56:03.600
Link: CVE-2023-28809

No data.

No data.