Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-32444 | Some access control products are vulnerable to a session hijacking attack because the product does not update the session ID after a user successfully logs in. To exploit the vulnerability, attackers have to request the session ID at the same time as a valid user logs in, and gain device operation permissions by forging the IP and session ID of an authenticated user. |
Fixes
Solution
https://www.hikvision.com/en/support/download/firmware/
Workaround
No workaround given by the vendor.
References
History
Wed, 18 Dec 2024 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: hikvision
Published:
Updated: 2024-12-18T16:24:05.385Z
Reserved: 2023-03-23T00:00:00
Link: CVE-2023-28809
Updated: 2024-08-02T13:51:38.488Z
Status : Modified
Published: 2023-06-15T19:15:10.537
Modified: 2024-11-21T07:56:03.600
Link: CVE-2023-28809
No data.
OpenCVE Enrichment
No data.
EUVD