Impact
The firmware of the XikeStor SKS8310‑8X handles session identifiers in the /goform/SetLogin endpoint with insufficient randomness. An attacker who can access the device over the network can compute or guess the session cookie and thus hijack an authenticated session, gaining the same privileges as an authorized user such as full configuration control.
Affected Systems
This weakness exists in Anhui Seeker Electronic Technology’s XikeStor SKS8310‑8X network switch. Firmware versions 1.04.B07 and earlier are affected. Devices running these releases should be considered vulnerable.
Risk and Exploitability
The vulnerability scores a CVSS score of 8.6, reflecting high severity. The EPSS score is below 1 %, indicating a very low probability of exploitation at the time of assessment. Attackers would require network access to the switch and the ability to reach the /goform/SetLogin endpoint; no local privilege escalation is required. While exploitation is possible remotely and could grant full administrative rights, the low EPSS suggests that known exploitation is not common yet; however, because the impact is the loss of control over the device, the risk remains non‑negligible.
OpenCVE Enrichment