This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.
Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.
Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-34881 | This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device. Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device. |
Fixes
Solution
Update Milesight NVR firmware to latest version https://www.milesight.com/support/download/firmware https://www.milesight.com/support/download/firmware
Workaround
No workaround given by the vendor.
References
History
Thu, 30 Jan 2025 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: CERT-In
Published:
Updated: 2025-01-30T17:16:05.788Z
Reserved: 2023-04-10T10:20:17.200Z
Link: CVE-2023-30466
Updated: 2024-08-02T14:28:50.581Z
Status : Modified
Published: 2023-04-28T11:15:08.987
Modified: 2024-11-21T08:00:14.443
Link: CVE-2023-30466
No data.
OpenCVE Enrichment
No data.
EUVD