Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-7921

Summary
Assigner-icscert
Assigner Org ID-7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At-06 May, 2017 | 00:00
Updated At-06 Mar, 2026 | 05:01
Rejected At-
Credits

Hikvision Multiple Products Improper Authentication Vulnerability

Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Known Exploited Vulnerabilities (KEV)
cisa.gov
Vendor:
HIKVISIONHikvision
Product:Multiple Products
Added At:05 Mar, 2026
Due At:26 Mar, 2026

Hikvision Multiple Products Improper Authentication Vulnerability

Multiple Hikvision products contain an improper authentication vulnerability that could allow a malicious user to escalate privileges on the system and gain access to sensitive information.

Used in Ransomware

:

Unknown

CWE

:
CWE-287

Required Action:

Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.

Additional Notes:

https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/ ; https://nvd.nist.gov/vuln/detail/CVE-2017-7921
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:icscert
Assigner Org ID:7d14cffa-0d7d-4270-9dc0-52cabd5a23a6
Published At:06 May, 2017 | 00:00
Updated At:06 Mar, 2026 | 05:01
Rejected At:
▼CVE Numbering Authority (CNA)

An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information.

Affected Products
Vendor
n/a
Product
Hikvision Cameras
Versions
Affected
  • Hikvision Cameras
Problem Types
TypeCWE IDDescription
CWECWE-287CWE-287
Type: CWE
CWE ID: CWE-287
Description: CWE-287
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01
x_refsource_MISC
http://www.securityfocus.com/bid/98313
vdb-entry
x_refsource_BID
https://ghostbin.com/paste/q2vq2
x_refsource_MISC
http://www.hikvision.com/us/about_10805.html
x_refsource_MISC
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01
Resource:
x_refsource_MISC
Hyperlink: http://www.securityfocus.com/bid/98313
Resource:
vdb-entry
x_refsource_BID
Hyperlink: https://ghostbin.com/paste/q2vq2
Resource:
x_refsource_MISC
Hyperlink: http://www.hikvision.com/us/about_10805.html
Resource:
x_refsource_MISC
▼Authorized Data Publishers (ADP)
1. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/
N/A
https://www.hikvision.com/cn/support/CybersecurityCenter/SecurityNotices/20170314/
N/A
https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification--privilege-escalating-vulnerability-in-cer/
N/A
https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01
x_refsource_MISC
x_transferred
http://www.securityfocus.com/bid/98313
vdb-entry
x_refsource_BID
x_transferred
https://ghostbin.com/paste/q2vq2
x_refsource_MISC
x_transferred
http://www.hikvision.com/us/about_10805.html
x_refsource_MISC
x_transferred
Hyperlink: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/
Resource: N/A
Hyperlink: https://www.hikvision.com/cn/support/CybersecurityCenter/SecurityNotices/20170314/
Resource: N/A
Hyperlink: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification--privilege-escalating-vulnerability-in-cer/
Resource: N/A
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.securityfocus.com/bid/98313
Resource:
vdb-entry
x_refsource_BID
x_transferred
Hyperlink: https://ghostbin.com/paste/q2vq2
Resource:
x_refsource_MISC
x_transferred
Hyperlink: http://www.hikvision.com/us/about_10805.html
Resource:
x_refsource_MISC
x_transferred
2. CISA ADP Vulnrichment
Affected Products
Metrics
VersionBase scoreBase severityVector
3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
kev
dateAdded:
2026-03-05
reference:
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7921
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
CVE-2017-7921 added to CISA KEV2026-03-05 00:00:00
Event: CVE-2017-7921 added to CISA KEV
Date: 2026-03-05 00:00:00
Replaced By

Rejected Reason

References
HyperlinkResource
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7921
government-resource
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7921
Resource:
government-resource
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:ics-cert@hq.dhs.gov
Published At:06 May, 2017 | 00:29
Updated At:05 Mar, 2026 | 20:16

An Improper Authentication issue was discovered in Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices. The improper authentication vulnerability occurs when an application does not adequately or correctly authenticate users. This may allow a malicious user to escalate his or her privileges on the system and gain access to sensitive information.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2026-03-052026-03-26Hikvision Multiple Products Improper Authentication VulnerabilityApply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Date Added: 2026-03-05
Due Date: 2026-03-26
Vulnerability Name: Hikvision Multiple Products Improper Authentication Vulnerability
Required Action: Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary3.010.0CRITICAL
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Primary2.07.5HIGH
AV:N/AC:L/Au:N/C:P/I:P/A:P
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 3.0
Base score: 10.0
Base severity: CRITICAL
Vector:
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 7.5
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:P
CPE Matches

HIKVISION
hikvision
>>ds-2cd2032-i_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2032-i_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2112-i_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2112-i_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2132-i_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2132-i_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2212-i5_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2212-i5_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2232-i5_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2232-i5_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2312-i_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2312-i_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2332-i_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2332-i_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2412f-i\(w\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2412f-i\(w\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2432f-i\(w\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2432f-i\(w\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2512f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2512f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2532f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2532f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2612f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2612f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2632f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2632f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2712f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2712f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2732f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2732f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2t32-i3_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2t32-i3_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2t32-i5_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2t32-i5_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd2t32-i8_firmware>>-
cpe:2.3:o:hikvision:ds-2cd2t32-i8_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4012f-\(a\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4012f-\(a\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4012f-\(p\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4012f-\(p\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4012f-\(w\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4012f-\(w\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4012fwd-\(a\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4012fwd-\(a\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4012fwd-\(p\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4012fwd-\(p\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4012fwd-\(w\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4012fwd-\(w\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4024f-\(a\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4024f-\(a\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4024f-\(p\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4024f-\(p\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4024f-\(w\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4024f-\(w\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4032fwd-\(a\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4032fwd-\(a\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4032fwd-\(p\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4032fwd-\(p\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4032fwd-\(w\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4032fwd-\(w\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4112f-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4112f-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4112fwd-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4112fwd-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4124f-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4124f-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4132fwd-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4132fwd-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4212f-i\(h\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4212f-i\(h\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4212f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4212f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4212f-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4212f-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4212fwd-i\(h\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4212fwd-i\(h\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4212fwd-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4212fwd-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4212fwd-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4212fwd-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4224f-i\(h\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4224f-i\(h\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4224f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4224f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4224f-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4224f-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4232fwd-i\(h\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4232fwd-i\(h\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4232fwd-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4232fwd-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4232fwd-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4232fwd-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4312f-i\(h\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4312f-i\(h\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4312f-i\(s\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4312f-i\(s\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4312f-i\(z\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4312f-i\(z\)_firmware:-:*:*:*:*:*:*:*
HIKVISION
hikvision
>>ds-2cd4324f-i\(h\)_firmware>>-
cpe:2.3:o:hikvision:ds-2cd4324f-i\(h\)_firmware:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-287Secondaryics-cert@hq.dhs.gov
CWE-287Primarynvd@nist.gov
CWE ID: CWE-287
Type: Secondary
Source: ics-cert@hq.dhs.gov
CWE ID: CWE-287
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.hikvision.com/us/about_10805.htmlics-cert@hq.dhs.gov
Patch
Vendor Advisory
http://www.securityfocus.com/bid/98313ics-cert@hq.dhs.gov
Third Party Advisory
VDB Entry
https://ghostbin.com/paste/q2vq2ics-cert@hq.dhs.gov
N/A
https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01ics-cert@hq.dhs.gov
Third Party Advisory
US Government Resource
http://www.hikvision.com/us/about_10805.htmlaf854a3a-2127-422b-91ae-364da2661108
Patch
Vendor Advisory
http://www.securityfocus.com/bid/98313af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://ghostbin.com/paste/q2vq2af854a3a-2127-422b-91ae-364da2661108
N/A
https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
US Government Resource
https://www.hikvision.com/cn/support/CybersecurityCenter/SecurityNotices/20170314/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification--privilege-escalating-vulnerability-in-cer/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/af854a3a-2127-422b-91ae-364da2661108
N/A
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7921134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: http://www.hikvision.com/us/about_10805.html
Source: ics-cert@hq.dhs.gov
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/98313
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://ghostbin.com/paste/q2vq2
Source: ics-cert@hq.dhs.gov
Resource: N/A
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01
Source: ics-cert@hq.dhs.gov
Resource:
Third Party Advisory
US Government Resource
Hyperlink: http://www.hikvision.com/us/about_10805.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Patch
Vendor Advisory
Hyperlink: http://www.securityfocus.com/bid/98313
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://ghostbin.com/paste/q2vq2
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://ics-cert.us-cert.gov/advisories/ICSA-17-124-01
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
US Government Resource
Hyperlink: https://www.hikvision.com/cn/support/CybersecurityCenter/SecurityNotices/20170314/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification--privilege-escalating-vulnerability-in-cer/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.hikvision.com/us-en/support/document-center/special-notices/privilege-escalating-vulnerability-in-certain-hikvision-ip-cameras/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-7921
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A

Change History

0
Information is not available yet

Similar CVEs

1225Records found

CVE-2013-4976
Matching Score-10
Assigner-MITRE Corporation
ShareView Details
Matching Score-10
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-8.26% / 92.25%
||
7 Day CHG~0.00%
Published-27 Dec, 2019 | 16:48
Updated-06 Aug, 2024 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Hikvision DS-2CD7153-E IP Camera has security bypass via hardcoded credentials

Action-Not Available
Vendor-n/aHIKVISION
Product-ds-2cd7153-e_firmwareds-2cd7153-en/a
CWE ID-CWE-287
Improper Authentication
CVE-2023-6895
Matching Score-8
Assigner-VulDB
ShareView Details
Matching Score-8
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-93.24% / 99.80%
||
7 Day CHG~0.00%
Published-17 Dec, 2023 | 08:00
Updated-21 Nov, 2024 | 14:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Hikvision Intercom Broadcasting System ping.php os command injection

A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.

Action-Not Available
Vendor-HIKVISION
Product-ds-kd-disds-kd-mds-kd-kkds-kd-kpds-kd-kk\/sds-kd-infods-kh6350-wte1ds-kh63le1\(b\)ds-kd-kp\/sintercom_broadcast_systemds-kh9310-wte1\(b\)ds-kd8003ime1\(b\)\/flushds-kh8520-wte1ds-kd-eds-kd8003ime1\(b\)ds-kd8003ime1\(b\)\/nsds-kh6320-wte1ds-kd8003ime1\(b\)\/sds-kh6320-te1ds-kh6320-wtde1ds-kh9510-wte1\(b\)ds-kh6220-le1ds-kh6320-le1ds-kh6320-tde1ds-kd-bkds-kh6351-te1ds-kd-inds-kd3003-e6ds-kh6351-wte1ds-kd8003ime1\(b\)\/surfaceIntercom Broadcasting System
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2018-6414
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.8||CRITICAL
EPSS-0.65% / 70.75%
||
7 Day CHG~0.00%
Published-13 Aug, 2018 | 15:00
Updated-05 Aug, 2024 | 06:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A buffer overflow vulnerability in the web server of some Hikvision IP Cameras allows an attacker to send a specially crafted message to affected devices. Due to the insufficient input validation, successful exploit can corrupt memory and lead to arbitrary code execution or crash the process.

Action-Not Available
Vendor-HIKVISION
Product-ip_camerasDS-2DE4xxxW,DS-2DE5xxxW,DS-2DE7xxxW
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2023-28808
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.1||CRITICAL
EPSS-0.59% / 69.21%
||
7 Day CHG~0.00%
Published-11 Apr, 2023 | 00:00
Updated-07 Feb, 2025 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Some Hikvision Hybrid SAN/Cluster Storage products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices.

Action-Not Available
Vendor-HIKVISION
Product-ds-a80624s_firmwareds-a80316sds-a81016s_firmwareds-a81016sds-a71072r_firmwareds-a71024_firmwareds-a72072r_firmwareds-a71024ds-a72024_firmwareds-a80316s_firmwareds-a82024d_firmwareds-a82024dds-a71072rds-a71048r-cvs_firmwareds-a80624sds-a71048r-cvsds-a71048ds-a72072rds-a71048_firmwareds-a72024DS-A71024/48/72R,DS-A80624S,DS-A81016S,DS-A72024/72R,DS-A80316S,DS-A82024DDS-A71024/48R-CVS,DS-A72024/48R-CVS
CWE ID-CWE-284
Improper Access Control
CVE-2023-28812
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.1||CRITICAL
EPSS-0.33% / 56.05%
||
7 Day CHG~0.00%
Published-23 Nov, 2023 | 08:35
Updated-02 Dec, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a buffer overflow vulnerability in a web browser plug-in could allow an attacker to exploit the vulnerability by sending crafted messages to computers installed with this plug-in, which could lead to arbitrary code execution or cause process exception of the plug-in.

Action-Not Available
Vendor-HIKVISION
Product-localservicecomponentsLocalServiceComponents
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2022-28171
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-7.5||HIGH
EPSS-84.10% / 99.31%
||
7 Day CHG~0.00%
Published-27 Jun, 2022 | 17:48
Updated-16 Sep, 2024 | 17:03
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to execute restricted commands by sending messages with malicious commands to the affected device.

Action-Not Available
Vendor-HIKVISION
Product-ds-a80624s_firmwareds-a80316sds-a81016s_firmwareds-a81016sds-a71072r_firmwareds-a71024_firmwareds-a72072r_firmwareds-a71024ds-a72024_firmwareds-a80316s_firmwareds-a72048r-cvsds-a82024d_firmwareds-a72048r-cvs_firmwareds-a82024dds-a71072rds-a71048r-cvs_firmwareds-a80624sds-a71048r-cvsds-a71048ds-a72072rds-a71048_firmwareds-a72024DS-A71024/48R-CVS,DS-A72024/48R-CVSDS-A71024/48/72R,DS-A80624S,DS-A81016S,DS-A72024/72R,DS-A80316S,DS-A82024D
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2022-28173
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.1||CRITICAL
EPSS-0.31% / 54.55%
||
7 Day CHG~0.00%
Published-21 Dec, 2022 | 01:21
Updated-16 Apr, 2025 | 14:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web server of some Hikvision wireless bridge products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices.

Action-Not Available
Vendor-HIKVISION
Product-ds-3wf01c-2n\/ods-3wf0ac-2nt_firmwareds-3wf0ac-2ntds-3wf01c-2n\/o_firmwareDS-3WF0AC-2NTDS-3WF01C-2N/O
CWE ID-CWE-284
Improper Access Control
CVE-2024-47485
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-5.5||MEDIUM
EPSS-0.81% / 74.19%
||
7 Day CHG~0.00%
Published-18 Oct, 2024 | 08:29
Updated-13 Mar, 2025 | 16:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is a CSV injection vulnerability in some HikCentral Master Lite versions. If exploited, an attacker could build malicious data to generate executable commands in the CSV file.

Action-Not Available
Vendor-HIKVISION
Product-hikcentral_masterHikCentral Master Litehikcentral_master_lite
CWE ID-CWE-1236
Improper Neutralization of Formula Elements in a CSV File
CVE-2021-36260
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-8
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-9.8||CRITICAL
EPSS-94.44% / 99.99%
||
7 Day CHG~0.00%
Published-22 Sep, 2021 | 12:07
Updated-10 Nov, 2025 | 14:44
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-01-24||Apply updates per vendor instructions.

A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.

Action-Not Available
Vendor-n/aHIKVISION
Product-ds-2dy92500x-a\(t5\)_firmwareds-2td1117-6\/pa_firmwareds-2cd2046g2-iu\/slds-2cd2123g2-iuds-2td8167-190ze2f\/wyds-2cd2143g2-iu_firmwareds-2td8166-180ze2f\/v2ds-2cd2743g2-izs_firmwareds-2df8236i5x-aelwptz-n4225i-de_firmwareds-2td1217b-3\/pads-2cd3156g2-is\(u\)_firmwareds-2df8a442ixs-ael\(t5\)_firmwareds-2cd3556g2-is_firmwareptz-n2404i-de3ds-2cd2686g2-izsu\/sl_firmwareds-2td6267-75c4l\/w_firmwareds-2cd2783g2-izs_firmwareds-2cd2066g2-iu\/slds-2cd3726g2-izsds-2df7225ix-aelw\(t3\)ds-2dy9236i8x-a\(t3\)_firmwareds-2td8167-190ze2f\/wy_firmwareds-7608ni-q2ds-2cd2121g1-idwds-2cd2786g2-izsds-2cd2147g2-l\(su\)ds-2df8442ixs-aelw\(t5\)ids-2vs435-f840-ey_firmwareds-2xe6242f-is\/316l\(b\)_firmwareds-2cd2346g2-isu\/slds-2cd2766g2-izs_firmwareds-2dyh2a0ixs-d\(t2\)_firmwareds-2td6267-100c4l\/wds-2td8167-230zg2f\/wyds-7616ni-q2_firmwareds-2cd2086g2-iu\/sl_firmwareds-2cd3056g2-is_firmwareds-2cd3143g2-i\(s\)u_firmwareds-2cd2047g2-l\(u\)ds-2cd2586g2-i\(s\)ds-7608ni-k1\/8pds-2cd2123g2-iu_firmwareds-2df8a442ixs-aely\(t5\)_firmwareds-2cd2366g2-isu\/slds-2cd2163g2-i\(s\)ds-2td8166-150ze2f\/v2_firmwareds-2cd3586g2-is_firmwareds-2td6237-50h4l\/w_firmwareds-2td4166t-9_firmwareids-2vs435-f840-ey\(t3\)_firmwareds-2cd3523g2-is_firmwareds-2cd2347g2-lsu\/sl_firmwareds-2cd2163g2-i\(s\)_firmwareds-2df8425ix-aelw\(t5\)_firmwareds-2td6266t-25h2l_firmwareds-2df8242ix-ael\(t5\)ds-2cd3056g2iu\/sl_firmwareds-2cd3743g2-izsds-2df6a825x-ael_firmwareds-2td8167-230zg2f\/w_firmwareds-2df8225ix-ael\(t3\)ds-2cd2086g2-i\(u\)_firmwareds-2cd2563g2-i\(s\)ds-2cd3126g2-isds-7616ni-q2\/16pds-2cd2686g2-izsds-2cd3356g2-isu\/slds-2df7225ix-ael\(t3\)ds-2cd2766g2-izsds-2td6237-50h4l\/wds-2df8a442ixs-aely\(t5\)ds-2td6267-50h4l\/w_firmwareds-2cd2121g0-i\(w\)\(s\)_firmwareds-2td8167-230zg2f\/wy_firmwareds-7104ni-q1\/4p\/mds-2td6237-75c4l\/wds-2df6a436x-aely\(t5\)_firmwareds-2td6236t-50h2lds-2cd3347g2-ls\(u\)ds-2df8436i5x-aelw\(t3\)ids-2sk718mxs-d_firmwareds-2cd2163g2-iuds-7608ni-k1ds-2cd2021g1-i\(w\)ds-7608ni-k1\/4gds-2cd2526g2-isds-2cd2087g2-l\(u\)_firmwareds-2cd2646g2-izsu\/slds-7604ni-k1_firmwareds-2cd2643g2-izs_firmwareds-2cd2366g2-i\(u\)ds-2cd3756g2-izs_firmwareds-2cd2663g2-izs_firmwareds-2cd2147g2-l\(su\)_firmwareds-2xe6422fwd-izhrs_firmwareds-2cd3626g2-izsds-2df6a825x-aelds-7104ni-q1\/4pds-7608ni-q2_firmwareds-2cd3626g2-izs_firmwareds-2cd3363g2-iu_firmwareds-2cd3523g2-isds-2cd2523g2-i\(u\)ds-7108ni-q1\/8p\/m_firmwareds-2cd2183g2-i\(s\)_firmwareds-7604ni-k1ds-2cd2186g2-i\(su\)_firmwareds-2cd2183g2-i\(s\)ds-2df8a442ixs-ael\(t5\)ds-2cd3726g2-izs_firmwareds-2dy9236i8x-a_firmwareds-2cd2343g2-i\(u\)ds-2cd3343g2-iu_firmwareds-7608ni-q1_firmwareds-2cd3343g2-iuds-2cd3126g2-is_firmwareds-2xe6452f-izh\(r\)s_firmwareptz-n4215i-deds-2cd2023g2-i\(u\)ds-2cd3686g2-izsds-7104ni-q1ds-2cd3086g2-isds-2cd3547g2-ls_firmwareds-2td8166-150zh2f\/v2ds-2td8167-230zg2f\/wds-2cd2386g2-i\(u\)_firmwareds-7104ni-q1\/4p_firmwareds-2cd2183g2-i\(u\)ds-2cd2066g2-iu\/sl_firmwareds-2td6266t-50h2lds-2cd2666g2-izs_firmwareds-2cd3123g2-i\(s\)u_firmwareds-2cd3123g2-i\(s\)uds-2df8a842ixs-ael\(t5\)ds-2cd2121g1-idw_firmwareds-2df8236i5x-aelw_firmwareds-2cd2546g2-i\(s\)_firmwareds-2cd3543g2-isds-2cd2566g2-i\(s\)ds-2dy9250izs-a\(t5\)_firmwareds-2cd2386g2-isu\/sl_firmwareds-2cd2763g2-izsds-2dy9240ix-a\(t5\)ds-2df8242i5x-aelw\(t3\)ids-2pt9a144mxs-d\/t2_firmwareds-7616ni-q1ds-2td6266t-25h2lds-2df8225ix-ael\(t5\)_firmwareds-2cd2027g2-l\(u\)_firmwareds-2cd3386g2-is_firmwareds-7616ni-q2\/16p_firmwareds-2df8242ix-aely\(t3\)ds-2cd2546g2-i\(s\)ds-2cd3026g2-isds-2cd3543g2-is_firmwareds-2cd2366g2-i\(u\)_firmwareds-7608ni-q2\/8pds-2cd2626g2-izsu\/sl_firmwareds-2cd2387g2-l\(u\)ds-2cd2021g1-i\(w\)_firmwareds-2td4167-50\/w_firmwareds-7108ni-q1\/8p\/mds-2cd3526g2-is_firmwareds-2cd3723g2-izs_firmwareds-2cd3326g2-isu\/slds-2cd2586g2-i\(s\)_firmwareds-2cd3023g2-iu_firmwareds-2cd2121g1-i\(w\)_firmwareds-2df6a225x-ael\)t3\)ds-2cd2321g0-i\/nfids-2vs435-f840-eyds-2cd3643g2-izsds-7608ni-q1ds-2cd2366g2-isu\/sl_firmwareds-2td8167-190ze2f\/wds-2td8166-100c2f\/v2_firmwareds-2td8167-150zc4f\/w_firmwareds-2cd3043g2-iu_firmwareds-2df8242ix-aelw\(t3\)_firmwareds-7604ni-q1_firmwareds-2df8225ix-aelw\(t3\)ds-2cd2666g2-izsds-2df6a836x-ael\(t5\)ds-2cd3723g2-izsds-2df8225ix-ael\(t5\)ds-2cd2646g2-izsu\/sl_firmwareds-2cd2543g2-i\(ws\)ds-2df8442ixs-ael\(t5\)_firmwareds-2df8425ix-ael\(t5\)ds-2td8167-190ze2f\/w_firmwareds-2td1217b-3\/pa_firmwareds-2cd2786g2-izs_firmwareds-2cd3623g2-izs_firmwareds-2cd3786g2-izs_firmwareds-2cd3056g2-iu\/sl_firmwareds-2cd2023g2-i\(u\)_firmwareds-2df8242i5x-ael\(t3\)_firmwareds-2xe6452f-izh\(r\)sds-2cd2186g2-i\(su\)ptz-n4215-de3_firmwareds-2td4167-25\/wds-2cd3563g2-is_firmwareds-7608ni-k1\/8p\/4g_firmwareds-2cd2621g0-i\(z\)\(s\)_firmwareds-2cd2723g2-izsds-2cd2523g2-i\(u\)_firmwareds-2df6a436x-ael\(t5\)ds-2df6a436x-ael\(t3\)_firmwareptz-n2204i-de3_firmwareds-2td1117-3\/pads-7108ni-q1\/mds-2cd3023g2-iuds-2df5225x-ae3\(t3\)ds-2cd2383g2-i\(u\)_firmwareds-2td4137-25\/wds-7604ni-q1\/4pds-2cd2526g2-is_firmwareds-2xe6242f-is\/316l\(b\)ds-2cd2623g2-izsds-2cd2183g2-iu_firmwareds-2df8225ix-aelw\(t3\)_firmwareds-2cd2683g2-izs_firmwareds-2cd2043g2-i\(u\)_firmwareds-2cd3126g2-is\(u\)ds-2cd3656g2-izs_firmwareds-2df8225ih-aelds-7608ni-k1\/4g_firmwareds-2df8a442ixs-ael\(t2\)_firmwareds-2df7232ix-ael\(t3\)_firmwareds-2df8425ix-ael\(t3\)_firmwareds-2td4167-50\/wds-2cd2583g2-i\(s\)_firmwareds-2df8242i5x-aelw\(t3\)_firmwareds-2cd2383g2-i\(u\)ds-2df5225x-ael\(t3\)ds-2df8242ix-aelw\(t3\)ds-2xe6422fwd-izhrsds-2df8242i5x-ael\(t3\)ds-2td6267-75c4l\/wds-2cd2166g2-i\(su\)_firmwareds-2df8a842ixs-ael\(t5\)_firmwareids-2sk8144ixs-d\/j_firmwareds-2cd3356g2-isds-760ni-k1\/4p_firmwareds-2cd3586g2-isds-2cd2127g2-\(-su\)_firmwareds-2cd2363g2-i\(u\)_firmwareds-2cd3086g2-is_firmwareds-2cd2166g2-i\(su\)ds-2cd2347g2-l\(u\)ds-2cd3547g2-lsds-7108ni-q1_firmwareds-7108ni-q1ds-2cd3563g2-isds-2xe6482f-izhrs_firmwareds-2cd2527g2-ls_firmwareptz-n4215-de3ds-2df8442ixs-aelw\(t2\)_firmwareds-2td8166-150zh2f\/v2_firmwareds-2cd3623g2-izsds-2cd2743g2-izsds-2cd2563g2-i\(s\)_firmwareds-2td4167-25\/w_firmwareds-2cd2063g2-i\(u\)ds-2cd3763g2-izsds-2td1217b-6\/pads-2cd2323g2-i\(u\)_firmwareptz-n4225i-deds-2cd2327g2-l\(u\)_firmwareds-2cd2721g0-i\(z\)\(s\)_firmwareds-2cd2121g0-i\(w\)\(s\)ds-7604ni-q1\/4p_firmwareds-2cd3663g2-izsds-2df8442ixs-aely\(t5\)_firmwareds-2cd2526g2-i\(s\)ds-2dy92500x-a\(t5\)ds-2td6266t-50h2l_firmwareds-2td8166-75c2f\/v2ds-7604ni-k1\/4p\/4gds-2cd2683g2-izsds-2td6237-75c4l\/w_firmwareds-2cd3786g2-izsds-2cd2723g2-izs_firmwareds-7104ni-q1\/mds-2cd2086g2-i\(u\)ds-2cd3643g2-izs_firmwareds-2dy9240ix-a\(t5\)_firmwareds-2cd2123g2-i\(s\)ds-2cd3386g2-is\(u\)ds-2cd2446g2-ids-2cd2363g2-i\(u\)ds-2cd3386g2-is\(u\)_firmwareds-2cd3663g2-izs_firmwareds-2cd2621g0-i\(z\)\(s\)ds-2cd2583g2-i\(s\)ds-2td1117-3\/pa_firmwareds-2cd2686g2-izsu\/slds-2cd2047g2-l\(u\)_firmwareds-7608ni-k1_firmwareds-2df7225ix-aelw\(t3\)_firmwareds-2df6a436x-ael\(t5\)_firmwareds-2cd2426g2-ids-2dy9236i8x-ads-2cd2043g2-i\(u\)ds-2df6a836x-ael\(t5\)_firmwareds-2df8436i5x-aelw\(t3\)_firmwareds-2df5232x-ael\(t3\)_firmwareds-2cd2446g2-i_firmwareds-2df7232ix-aelw\(t3\)ds-2cd2027g2-l\(u\)ds-2cd3056g2-iu\/slds-2cd3347g2-ls\(u\)_firmwareds-7608ni-q1\/8p_firmwareds-2df8225ix-ael\(t3\)_firmwareptz-n4215i-de_firmwareds-2cd2566g2-i\(s\)_firmwareds-2cd3043g2-iuds-2cd3323g2-iu_firmwareds-2df8442ixs-aely\(t5\)ds-2df8a442nxs-ael\(t5\)_firmwareds-2df5232x-ael\(t3\)ds-2cd2063g2-i\(u\)_firmwareds-2df7225ix-ael\(t3\)_firmwareds-7616ni-k1_firmwareds-2cd2386g2-i\(u\)ptz-n5225i-ads-2df8442ixs-aelwy\(t5\)ds-2df6a236x-ael\(t3\)_firmwareds-2dy9250izs-a\(t5\)ds-2cd3323g2-iuds-2df8425ix-ael\(t3\)ds-2cd3026g2-iu\/slds-2cd2127g2-\(-su\)ds-2cd2027g2-lu\/sl_firmwareds-2df5225x-ae3\(t3\)_firmwareds-2df8442ixs-aelw\(t2\)ds-7616ni-k1ds-2cd3156g2-isds-2cd2143g2-i\(s\)ds-2cd3126g2-is\(u\)_firmwareds-2df8225ih-ael\(w\)ds-7616ni-q2ds-2cd2421g0-i\(d\)\(w\)ds-2cd2421g0-i\(d\)w_firmwareds-2cd2086g2-iu\/slds-2df8a442ixs-ael\(t2\)ds-7608ni-q2\/8p_firmwareds-2df5232x-ae3\)t3\)ds-2df6a436x-ael\(t3\)ds-2td6236t-50h2l_firmwareds-2cd3163g2-i\(s\)u_firmwareds-2td8166-180ze2f\/v2_firmwareds-2df6a425x-ael\(t3\)_firmwareds-2df8242i5x-aelw\(t5\)_firmwareds-2cd3047g2-ls_firmwareds-2cd3526g2-isds-2cd2527g2-lsds-2cd2323g2-i\(u\)ds-2cd3026g2-iu\/sl_firmwareds-2df8225ix-aelw\(t5\)_firmwareds-2cd3686g2-izs_firmwareds-2df7232ix-aelw\(t3\)_firmwareds-2df8225ix-aelw\(t5\)ds-2td6267-75c4l\/wyds-2cd2547g2-lzs_firmwareds-2cd2547g2-lzsds-2cd2066g2-i\(u\)_firmwareds-2cd2523g2-i\(s\)ds-7108ni-q1\/8pds-2cd2321g0-i\/nf_firmwareds-2td4137-50\/w_firmwareds-2dyh2a0ixs-d\(t2\)ds-2td8166-75c2f\/v2_firmwareds-2cd2643g2-izsds-2cd3656g2-izsds-7104ni-q1_firmwareds-2df8242ix-aely\(t3\)_firmwareds-2cd2626g2-izsu\/slds-2dy9236ix-a\(t3\)_firmwareds-7104ni-q1\/m_firmwareds-2cd2421g0-i\(d\)wds-2cd2543g2-i\(ws\)_firmwareds-2td4166t-9ds-2dy9236x-a\(t3\)_firmwareds-2df5232x-ae3\)t3\)_firmwareds-2cd3186g2-is\(u\)ds-2cd3047g2-lsds-2df8242i5x-aelw\(t5\)ds-2td8167-150zc4f\/wds-2cd2426g2-i_firmwareds-7608ni-k1\/8p_firmwareds-2td6267-75c4l\/wy_firmwareds-2cd2526g2-i\(s\)_firmwareds-2cd3356g2-is\(u\)_firmwareds-2td4136t-9_firmwareds-2df6a236x-ael\(t3\)ds-2td1117-2\/pa_firmwareds-2cd2186g2-isuds-2df8425ix-ael\(t5\)_firmwareds-2df8442ixs-ael\(t5\)ds-2cd2343g2-i\(u\)_firmwareds-2td6267-100c4l\/wy_firmwareds-2td6267-100c4l\/w_firmwareds-2cd2123g2-i\(s\)_firmwareds-2dy9236ix-a\(t3\)ids-2sk8144ixs-d\/jds-2td6267-100c4l\/wyds-2cd3763g2-izs_firmwareds-2cd3356g2-is\(u\)ds-2cd2026g2-iu\/sl_firmwareds-2cd2547g2-lsds-2cd3756g2-izsds-2cd2523g2-i\(s\)_firmwareds-2cd2143g2-i\(s\)_firmwareds-2dy9236i8x-a\(t3\)ds-2cd3186g2-is\(u\)_firmwareds-2td1117-2\/pads-2cd2666g2-izsu\/sl_firmwareds-2cd2121g1-i\(w\)ds-2cd2186g2-isu_firmwareds-2cd3156g2-is_firmwareids-2vs435-f840-ey\(t3\)ds-7108ni-q1\/m_firmwareds-2cd3326g2-isu\/sl_firmwareds-2cd3163g2-i\(s\)uds-7108ni-q1\/8p_firmwareds-7608ni-k1\/8p\/4gds-2cd2083g2-i\(u\)ds-2cd3363g2-iuds-2df8a442nxs-ael\(t5\)ds-2cd2783g2-izsds-2cd3056g2-isptz-n5225i-a_firmwareds-2cd2387g2-l\(u\)_firmwareids-2pt9a144mxs-d\/t2ds-2df8442ixs-aelwy\(t5\)_firmwareds-2df8a442ixs-af\/sp\(t5\)_firmwareds-2cd3063g2-iuds-2cd2163g2-iu_firmwareds-2cd2326g2-isu\/sl_firmwareds-2cd3386g2-isds-2cd2087g2-l\(u\)ds-2cd2183g2-iuds-2cd2083g2-i\(u\)_firmwareds-2cd2346g2-isu\/sl_firmwareds-2df6a225x-ael\)t3\)_firmwareds-2cd2421g0-i\(d\)\(w\)_firmwareds-2cd2066g2-i\(u\)ds-2df8225ih-ael\(w\)_firmwareds-2df8242ix-ael\(t5\)_firmwareds-7616ni-q1_firmwareds-2cd2027g2-lu\/slds-2cd2347g2-l\(u\)_firmwareds-2xe6442f-izhrs\(b\)ds-2cd2183g2-i\(u\)_firmwareds-2df6a425x-ael\(t3\)ds-2cd2121g1_firmwareds-7604ni-q1ds-2cd3063g2-iu_firmwareptz-n2404i-de3_firmwareds-2df7232ix-ael\(t3\)ds-2xe6442f-izhrs\(b\)_firmwareds-2df6a436x-aely\(t5\)ds-2cd3356g2-is_firmwareds-2cd2327g2-l\(u\)ds-2cd3743g2-izs_firmwareds-760ni-k1\/4pds-2df8250i8x-ael\(t3\)ds-2df8425ix-aelw\(t5\)ds-2cd3056g2iu\/slds-2cd2386g2-isu\/slds-2xe6482f-izhrsds-2dy9236x-a\(t3\)ds-2df8250i8x-ael\(t3\)_firmwareds-2df5225x-ael\(t3\)_firmwareds-2cd2046g2-iu\/sl_firmwareds-2df8442ixs-aelw\(t5\)_firmwareds-2cd2666g2-izsu\/slds-2cd2763g2-izs_firmwareds-2cd2026g2-iu\/slds-2cd2121g1ds-2cd3143g2-i\(s\)uds-2cd3556g2-isds-2td1217b-6\/pa_firmwareds-2cd2143g2-iuds-2cd2326g2-isu\/slds-2cd2663g2-izsds-2cd3026g2-is_firmwareds-2cd2547g2-ls_firmwareds-2td1117-6\/pads-7604ni-k1\/4p\/4g_firmwareds-7104ni-q1\/4p\/m_firmwareds-2td4136t-9ds-2cd2347g2-lsu\/slds-2cd2623g2-izs_firmwareds-2td8166-150ze2f\/v2ptz-n2204i-de3ds-2td4137-25\/w_firmwareds-2td4137-50\/wds-7608ni-q1\/8pds-2cd2686g2-izs_firmwareds-2td6267-50h4l\/wds-2cd3356g2-isu\/sl_firmwareds-2df8425ix-aelw\(t3\)_firmwareds-2cd3156g2-is\(u\)ds-2cd2721g0-i\(z\)\(s\)ds-2df8225ih-ael_firmwareds-2df8425ix-aelw\(t3\)ds-2td8166-100c2f\/v2ds-2df8a442ixs-af\/sp\(t5\)ids-2sk718mxs-dn/aSecurity cameras web server
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2014-4880
Matching Score-8
Assigner-CERT/CC
ShareView Details
Matching Score-8
Assigner-CERT/CC
CVSS Score-7.5||HIGH
EPSS-78.10% / 99.02%
||
7 Day CHG~0.00%
Published-08 Dec, 2014 | 11:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Buffer overflow in Hikvision DVR DS-7204 Firmware 2.2.10 build 131009, and other models and versions, allows remote attackers to execute arbitrary code via an RTSP PLAY request with a long Authorization header.

Action-Not Available
Vendor-n/aHIKVISION
Product-dvr_ds-7204dvr_ds-7204_firmwaren/a
CWE ID-CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
CVE-2025-66174
Matching Score-6
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
ShareView Details
Matching Score-6
Assigner-Hangzhou Hikvision Digital Technology Co., Ltd.
CVSS Score-6.5||MEDIUM
EPSS-0.07% / 20.75%
||
7 Day CHG~0.00%
Published-19 Dec, 2025 | 06:39
Updated-23 Dec, 2025 | 21:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

There is an improper authentication vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and run a series of commands.

Action-Not Available
Vendor-HIKVISION
Product-ds-7204hghi-f1ds-7104hghi-f1_firmwareds-7204hghi-f1_firmwareds-7104hghi-f1DS-7104HGHI-F1DS-7204HGHI-F1
CWE ID-CWE-287
Improper Authentication
CVE-2025-50901
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.10% / 26.76%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 00:00
Updated-11 Sep, 2025 | 19:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

JeeWMS 771e4f5d0c01ffdeae1671be4cf102b73a3fe644 (2025-05-19) contains incorrect authentication bypass vulnerability, which can lead to arbitrary file reading.

Action-Not Available
Vendor-jeewmsn/a
Product-jeewmsn/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-1148
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 21.45%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 07:34
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weak Access Control - Arbitrary file upload

Weak access control in OpenText PVCS Version Manager allows potential bypassing of authentication and uploading of files.

Action-Not Available
Vendor-Open Text Corporation
Product-PVCS Version Managerpvcs_version_manager
CWE ID-CWE-287
Improper Authentication
CVE-2026-6577
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-Not Assigned
Published-19 Apr, 2026 | 19:30
Updated-19 Apr, 2026 | 20:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
liangliangyy DjangoBlog logtracks Endpoint views.py missing authentication

A vulnerability was identified in liangliangyy DjangoBlog up to 2.1.0.0. The impacted element is an unknown function of the file owntracks/views.py of the component logtracks Endpoint. The manipulation leads to missing authentication. The attack can be initiated remotely. The exploit is publicly available and might be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-liangliangyy
Product-DjangoBlog
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2026-6582
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-Not Assigned
Published-19 Apr, 2026 | 22:45
Updated-19 Apr, 2026 | 23:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
TransformerOptimus SuperAGI Vector Database Management Endpoint vector_dbs.py get_vector_db_details missing authentication

A flaw has been found in TransformerOptimus SuperAGI up to 0.0.14. Affected by this issue is the function get_vector_db_details of the file superagi/controllers/vector_dbs.py of the component Vector Database Management Endpoint. Executing a manipulation can lead to missing authentication. The attack can be executed remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-TransformerOptimus
Product-SuperAGI
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2008-3299
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-2.18% / 84.36%
||
7 Day CHG~0.00%
Published-25 Jul, 2008 | 13:18
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

eSyndiCat 1.6 allows remote attackers to bypass authentication and gain administrative access by setting the admin_lng cookie value to 1. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.

Action-Not Available
Vendor-esyndicatn/a
Product-esyndicatn/a
CWE ID-CWE-287
Improper Authentication
CVE-2026-28514
Matching Score-4
Assigner-GitHub, Inc.
ShareView Details
Matching Score-4
Assigner-GitHub, Inc.
CVSS Score-9.3||CRITICAL
EPSS-0.05% / 14.05%
||
7 Day CHG~0.00%
Published-06 Mar, 2026 | 17:35
Updated-18 Mar, 2026 | 16:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Rocket.Chat: Users can login with any password via the EE ddp-streamer-service

Rocket.Chat is an open-source, secure, fully customizable communications platform. Prior to versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0, a critical authentication bypass vulnerability exists in Rocket.Chat's account service used in the ddp-streamer micro service that allows an attacker to log in to the service as any user with a password set, using any arbitrary password. The vulnerability stems from a missing await keyword when calling an asynchronous password validation function, causing a Promise object (which is always truthy) to be evaluated instead of the actual boolean validation result. This may lead to account takeover of any user whose username is known or guessable. This issue has been patched in versions 7.8.6, 7.9.8, 7.10.7, 7.11.4, 7.12.4, 7.13.3, and 8.0.0.

Action-Not Available
Vendor-rocket.chatRocketChat
Product-rocket.chatRocket.Chat
CWE ID-CWE-287
Improper Authentication
CVE-2024-11209
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-5.3||MEDIUM
EPSS-0.25% / 48.06%
||
7 Day CHG~0.00%
Published-14 Nov, 2024 | 13:31
Updated-19 Nov, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Apereo CAS 2FA login improper authentication

A vulnerability was found in Apereo CAS 6.6. It has been classified as critical. This affects an unknown part of the file /login?service of the component 2FA. The manipulation leads to improper authentication. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-apereoApereoapereo
Product-central_authentication_serviceCAScas_server
CWE ID-CWE-287
Improper Authentication
CVE-2018-10611
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-5.46% / 90.21%
||
7 Day CHG~0.00%
Published-04 Jun, 2018 | 14:00
Updated-16 Sep, 2024 | 18:33
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Java remote method invocation (RMI) input port in GE MDS PulseNET and MDS PulseNET Enterprise version 3.2.1 and prior may be exploited to allow unauthenticated users to launch applications and support remote code execution through web services.

Action-Not Available
Vendor-geGE
Product-mds_pulsenetMDS PulseNET and MDS PulseNET Enterprise
CWE ID-CWE-287
Improper Authentication
CVE-2008-3375
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-12.50% / 93.95%
||
7 Day CHG~0.00%
Published-30 Jul, 2008 | 17:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The jrCookie function in includes/jamroom-misc.inc.php in JamRoom before 3.4.0 allows remote attackers to bypass authentication and gain administrative access via a boolean value within serialized data in a JMU_Cookie cookie.

Action-Not Available
Vendor-jamroomn/a
Product-jamroomn/a
CWE ID-CWE-287
Improper Authentication
CVE-2018-10603
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-2.91% / 86.39%
||
7 Day CHG~0.00%
Published-31 Jul, 2018 | 17:00
Updated-17 Sep, 2024 | 00:21
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Martem TELEM GW6 and GWM devices with firmware 2018.04.18-linux_4-01-601cb47 and prior do not perform authentication of IEC-104 control commands, which may allow a rogue node a remote control of the industrial process.

Action-Not Available
Vendor-martemMartem
Product-telem-gw6_firmwaretelem-gwm_firmwaretelem-gwmtelem-gw6TELEM GW6TELEM GWM
CWE ID-CWE-306
Missing Authentication for Critical Function
CWE ID-CWE-287
Improper Authentication
CVE-2018-10561
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-93.31% / 99.81%
||
7 Day CHG~0.00%
Published-04 May, 2018 | 03:00
Updated-05 Nov, 2025 | 19:23
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Known KEV||Action Due Date - 2022-04-21||The impacted product is end-of-life and should be disconnected if still in use.

An issue was discovered on Dasan GPON home routers. It is possible to bypass authentication simply by appending "?images" to any URL of the device that requires authentication, as demonstrated by the /menu.html?images/ or /GponForm/diag_FORM?images/ URI. One can then manage the device.

Action-Not Available
Vendor-dasannetworksn/aDasan
Product-gpon_router_firmwaregpon_routern/aGigabit Passive Optical Network (GPON) Routers
CWE ID-CWE-287
Improper Authentication
CVE-2018-0669
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.92% / 76.00%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 22:00
Updated-05 Aug, 2024 | 03:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

INplc-RT 3.08 and earlier allows remote attackers to bypass authentication to execute an arbitrary command through the protocol-compliant traffic. This is a different vulnerability than CVE-2018-0670.

Action-Not Available
Vendor-mncMICRONET CORPORATION
Product-inplc-rtINplc-RT
CWE ID-CWE-287
Improper Authentication
CVE-2024-1147
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-9.8||CRITICAL
EPSS-0.07% / 21.45%
||
7 Day CHG~0.00%
Published-21 Mar, 2024 | 07:33
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Weak Access Control - Arbitrary file download

Weak access control in OpenText PVCS Version Manager allows potential bypassing of authentication and download of files.

Action-Not Available
Vendor-Open Text Corporation
Product-PVCS Version Managerpvcs_version_manager
CWE ID-CWE-287
Improper Authentication
CVE-2018-0121
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.64% / 87.86%
||
7 Day CHG~0.00%
Published-22 Feb, 2018 | 00:00
Updated-02 Dec, 2024 | 21:08
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the authentication functionality of the web-based service portal of Cisco Elastic Services Controller Software could allow an unauthenticated, remote attacker to bypass authentication and execute arbitrary actions with administrator privileges on an affected system. The vulnerability is due to improper security restrictions that are imposed by the web-based service portal of the affected software. An attacker could exploit this vulnerability by submitting an empty password value to an affected portal when prompted to enter an administrative password for the portal. A successful exploit could allow the attacker to bypass authentication and gain administrator privileges for the web-based service portal of the affected software. This vulnerability affects Cisco Elastic Services Controller Software Release 3.0.0. Cisco Bug IDs: CSCvg29809.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-elastic_services_controllervirtual_managed_servicesCisco Elastic Services Controller
CWE ID-CWE-287
Improper Authentication
CVE-2018-0271
Matching Score-4
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-4
Assigner-Cisco Systems, Inc.
CVSS Score-9.8||CRITICAL
EPSS-3.00% / 86.59%
||
7 Day CHG~0.00%
Published-17 May, 2018 | 03:00
Updated-29 Nov, 2024 | 15:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the API gateway of the Cisco Digital Network Architecture (DNA) Center could allow an unauthenticated, remote attacker to bypass authentication and access critical services. The vulnerability is due to a failure to normalize URLs prior to servicing requests. An attacker could exploit this vulnerability by submitting a crafted URL designed to exploit the issue. A successful exploit could allow the attacker to gain unauthenticated access to critical services, resulting in elevated privileges in DNA Center. This vulnerability affects Cisco DNA Center Software Releases prior to 1.1.2. Cisco Bug IDs: CSCvi09394.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-digital_network_architecture_centerCisco Digital Network Architecture Center
CWE ID-CWE-287
Improper Authentication
CVE-2025-14942
Matching Score-4
Assigner-wolfSSL Inc.
ShareView Details
Matching Score-4
Assigner-wolfSSL Inc.
CVSS Score-9.4||CRITICAL
EPSS-0.08% / 24.55%
||
7 Day CHG~0.00%
Published-06 Jan, 2026 | 17:26
Updated-12 Jan, 2026 | 17:53
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass

wolfSSH’s key exchange state machine can be manipulated to leak the client’s password in the clear, trick the client to send a bogus signature, or trick the client into skipping user authentication. This affects client applications with wolfSSH version 1.4.21 and earlier. Users of wolfSSH must update or apply the fix patch and it’s recommended to update credentials used. This fix is also recommended for wolfSSH server applications. While there aren’t any specific attacks on server applications, the same defect is present. Thanks to Aina Toky Rasoamanana of Valeo and Olivier Levillain of Telecom SudParis for the report.

Action-Not Available
Vendor-wolfsshwolfSSL
Product-wolfsshwolfSSH
CWE ID-CWE-287
Improper Authentication
CVE-2026-5616
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.12% / 30.27%
||
7 Day CHG~0.00%
Published-06 Apr, 2026 | 03:15
Updated-07 Apr, 2026 | 13:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
JeecgBoot AI Chat JeecgBizToolsProvider.java missing authentication

A security vulnerability has been detected in JeecgBoot 3.9.0/3.9.1. The impacted element is an unknown function of the file jeecg-boot/jeecg-module-system/jeecg-system-biz/src/main/java/org/jeecg/modules/airag/JeecgBizToolsProvider.java of the component AI Chat Module. Such manipulation leads to missing authentication. The attack can be executed remotely. The name of the patch is b7c9aeba7aefda9e008ea8fe4fc3daf08d0c5b39/2c1cc88b8d983868df8c520a343d6ff4369d9e59. It is best practice to apply a patch to resolve this issue. The project fixed the issue with a commit which shall be part of the next official release.

Action-Not Available
Vendor-n/a
Product-JeecgBoot
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2017-9939
Matching Score-4
Assigner-Siemens
ShareView Details
Matching Score-4
Assigner-Siemens
CVSS Score-9.8||CRITICAL
EPSS-2.06% / 83.94%
||
7 Day CHG~0.00%
Published-08 Aug, 2017 | 00:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability was discovered in Siemens SiPass integrated (All versions before V2.70) that could allow an attacker with network access to the SiPass integrated server to bypass the authentication mechanism and perform administrative operations.

Action-Not Available
Vendor-n/aSiemens AG
Product-sipass_integratedSiPass integrated All versions before V2.70
CWE ID-CWE-287
Improper Authentication
CVE-2018-0670
Matching Score-4
Assigner-JPCERT/CC
ShareView Details
Matching Score-4
Assigner-JPCERT/CC
CVSS Score-9.8||CRITICAL
EPSS-0.92% / 76.00%
||
7 Day CHG~0.00%
Published-09 Jan, 2019 | 22:00
Updated-05 Aug, 2024 | 03:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

INplc-RT 3.08 and earlier allows remote attackers to bypass authentication to execute an arbitrary command through the protocol-compliant traffic. This is a different vulnerability than CVE-2018-0669.

Action-Not Available
Vendor-mncMICRONET CORPORATION
Product-inplc-rtINplc-RT
CWE ID-CWE-287
Improper Authentication
CVE-2025-41108
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
ShareView Details
Matching Score-4
Assigner-Spanish National Cybersecurity Institute, S.A. (INCIBE)
CVSS Score-9.2||CRITICAL
EPSS-0.04% / 13.13%
||
7 Day CHG~0.00%
Published-22 Oct, 2025 | 08:14
Updated-31 Oct, 2025 | 19:45
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Improper Authentication vulnerability in Ghost Robotics' Vision 60

The communication protocol implemented in Ghost Robotics Vision 60 v0.27.2 could allow an attacker to send commands to the robot from an external attack station, impersonating the control station (tablet) and gaining unauthorised full control of the robot. The absence of encryption and authentication mechanisms in the communication protocol allows an attacker to capture legitimate traffic between the robot and the controller, replicate it, and send any valid command to the robot from any attacking computer or device. The communication protocol used in this interface is based on MAVLink, a widely documented protocol, which increases the likelihood of attack. There are two methods for connecting to the robot remotely: Wi-Fi and 4G/LTE.

Action-Not Available
Vendor-ghostroboticsGhost Robotics
Product-vision_60_firmwarevision_60Vision 60
CWE ID-CWE-287
Improper Authentication
CVE-2024-10173
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.14% / 34.12%
||
7 Day CHG~0.00%
Published-20 Oct, 2024 | 05:00
Updated-22 Oct, 2024 | 17:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
didi DDMQ Console Module improper authentication

A vulnerability has been found in didi DDMQ 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the component Console Module. The manipulation with the input /;login leads to improper authentication. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-didiglobaldidididi
Product-ddmqDDMQddmq
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-863
Incorrect Authorization
CVE-2021-31917
Matching Score-4
Assigner-Red Hat, Inc.
ShareView Details
Matching Score-4
Assigner-Red Hat, Inc.
CVSS Score-9.8||CRITICAL
EPSS-0.43% / 62.61%
||
7 Day CHG~0.00%
Published-21 Sep, 2021 | 10:33
Updated-03 Aug, 2024 | 23:10
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A flaw was found in Red Hat DataGrid 8.x (8.0.0, 8.0.1, 8.1.0 and 8.1.1) and Infinispan (10.0.0 through 12.0.0). An attacker could bypass authentication on all REST endpoints when DIGEST is used as the authentication method. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.

Action-Not Available
Vendor-infinispann/aRed Hat, Inc.
Product-infinispan-server-restdata_gridRed Hat DataGrid and Infinispan
CWE ID-CWE-287
Improper Authentication
CVE-2017-9820
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.55% / 67.91%
||
7 Day CHG~0.00%
Published-24 Aug, 2018 | 21:00
Updated-05 Aug, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The National Payments Corporation of India BHIM application 1.3 for Android uses a custom keypad for which the input element is available to the Accessibility service, which makes it easier for attackers to bypass authentication.

Action-Not Available
Vendor-npcin/a
Product-bharat_interface_for_money_\(bhim\)n/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-8861
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-1.07% / 77.74%
||
7 Day CHG~0.00%
Published-22 Nov, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Missing authentication for the remote configuration port 1236/tcp on the Cohu 3960HD allows an attacker to change configuration parameters such as IP address and username/password via specially crafted XML SOAP packets.

Action-Not Available
Vendor-cohuhdn/a
Product-3960hd_firmware3960hdn/a
CWE ID-CWE-287
Improper Authentication
CVE-2025-4144
Matching Score-4
Assigner-Cloudflare, Inc.
ShareView Details
Matching Score-4
Assigner-Cloudflare, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.40% / 60.50%
||
7 Day CHG~0.00%
Published-01 May, 2025 | 00:50
Updated-12 May, 2025 | 19:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
PKCE bypass via downgrade attack

PKCE was implemented in the OAuth implementation in workers-oauth-provider that is part of MCP framework https://github.com/cloudflare/workers-mcp . However, it was found that an attacker could cause the check to be skipped. Fixed in: https://github.com/cloudflare/workers-oauth-provider/pull/27 https://github.com/cloudflare/workers-oauth-provider/pull/27 Impact: PKCE is a defense-in-depth mechanism against certain kinds of attacks and was an optional extension in OAuth 2.0 which became required in the OAuth 2.1 draft. (Note that the MCP specification requires OAuth 2.1.). This bug completely bypasses PKCE protection.

Action-Not Available
Vendor-Cloudflare, Inc.
Product-workers-oauth-provider
CWE ID-CWE-287
Improper Authentication
CVE-2024-1039
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.8||CRITICAL
EPSS-0.16% / 37.07%
||
7 Day CHG~0.00%
Published-01 Feb, 2024 | 21:38
Updated-07 Aug, 2025 | 19:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Use of Hard-coded Credentials in Gessler GmbH WEB-MASTER

Gessler GmbH WEB-MASTER has a restoration account that uses weak hard coded credentials and if exploited could allow an attacker control over the web management of the device.

Action-Not Available
Vendor-gesslergmbhGessler GmbH
Product-web-masterweb-master_firmwareWEB-MASTER
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-798
Use of Hard-coded Credentials
CVE-2017-9285
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
ShareView Details
Matching Score-4
Assigner-OpenText (formerly Micro Focus)
CVSS Score-5.4||MEDIUM
EPSS-0.21% / 43.25%
||
7 Day CHG~0.00%
Published-02 Mar, 2018 | 20:00
Updated-17 Sep, 2024 | 00:25
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Login restrictions not applied when using ebaclient against NetIQ eDirectory EBA interface

NetIQ eDirectory before 9.0 SP4 did not enforce login restrictions when "ebaclient" was used, allowing unpermitted access to eDirectory services.

Action-Not Available
Vendor-netiqNetIQMicro Focus International Limited
Product-edirectoryeDirectory
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2024-11015
Matching Score-4
Assigner-Wordfence
ShareView Details
Matching Score-4
Assigner-Wordfence
CVSS Score-9.8||CRITICAL
EPSS-0.14% / 34.63%
||
7 Day CHG~0.00%
Published-12 Dec, 2024 | 03:23
Updated-15 Apr, 2026 | 00:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sign In With Google <= 1.8.0 - Authentication Bypass in authenticate_user

The Sign In With Google plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.8.0. This is due to the 'authenticate_user' user function not implementing sufficient null value checks when setting the access token and user information. This makes it possible for unauthenticated attackers to log in as the first user who has signed in using Google OAuth, which could be the site administrator.

Action-Not Available
Vendor-tarecord
Product-Sign In With Google
CWE ID-CWE-287
Improper Authentication
CVE-2017-9630
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
ShareView Details
Matching Score-4
Assigner-Cybersecurity and Infrastructure Security Agency (CISA) Industrial Control Systems (ICS)
CVSS Score-9.4||CRITICAL
EPSS-0.20% / 41.65%
||
7 Day CHG~0.00%
Published-07 Aug, 2017 | 08:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An Improper Authentication issue was discovered in PDQ Manufacturing LaserWash G5 and G5 S Series all versions, LaserWash M5, all versions, LaserWash 360 and 360 Plus, all versions, LaserWash AutoXpress and AutoExpress Plus, all versions, LaserJet, all versions, ProTouch Tandem, all versions, ProTouch ICON, all versions, and ProTouch AutoGloss, all versions. The web server does not properly verify that provided authentication information is correct.

Action-Not Available
Vendor-pdqincn/a
Product-laserwash_m5laserwash_autoxpressprotouch_iconprotouch_autoglosslaserwash_autoxpress_pluslaserwash_autoxpress_plus_firmwarelaserwash_g5_s_firmwareprotouch_icon_firmwarelaserwash_g5_firmwareprotouch_tandemlaserwash_g5laserjet_firmwarelaserwash_m5_firmwarelaserwash_360laserwash_autoxpress_firmwareprotouch_tandem_firmwareprotouch_autogloss_firmwarelaserwash_360_firmwarelaserwash_360_plus_firmwarelaserwash_360_pluslaserjetlaserwash_g5_sPDQ Manufacturing, Inc. LaserWash, Laser Jet and ProTouch
CWE ID-CWE-287
Improper Authentication
CVE-2006-3583
Matching Score-4
Assigner-Flexera Software LLC
ShareView Details
Matching Score-4
Assigner-Flexera Software LLC
CVSS Score-7.5||HIGH
EPSS-1.30% / 79.77%
||
7 Day CHG~0.00%
Published-08 Aug, 2006 | 23:00
Updated-16 Apr, 2026 | 00:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Session fixation vulnerability in Jetbox CMS 2.1 SR1 allows remote attackers to hijack web sessions via a crafted link and the administrator section.

Action-Not Available
Vendor-jetboxn/a
Product-jetbox_cmsn/a
CWE ID-CWE-287
Improper Authentication
CVE-2017-9819
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.53% / 67.05%
||
7 Day CHG~0.00%
Published-24 Aug, 2018 | 21:00
Updated-05 Aug, 2024 | 17:18
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The National Payments Corporation of India BHIM application 1.3 for Android does not properly restrict use of the OTP feature, which makes it easier for attackers to bypass authentication.

Action-Not Available
Vendor-npcin/a
Product-bharat_interface_for_money_\(bhim\)n/a
CWE ID-CWE-287
Improper Authentication
CVE-2007-1480
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-6.69% / 91.26%
||
7 Day CHG~0.00%
Published-16 Mar, 2007 | 21:00
Updated-07 Aug, 2024 | 12:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Creative Guestbook 1.0 allows remote attackers to add an administrative account via a direct request to createadmin.php with Name, Email, and PASSWORD parameters set.

Action-Not Available
Vendor-creative_guestbookn/a
Product-creative_guestbookn/a
CWE ID-CWE-287
Improper Authentication
CVE-2026-5676
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.9||MEDIUM
EPSS-0.09% / 25.78%
||
7 Day CHG~0.00%
Published-06 Apr, 2026 | 18:15
Updated-07 Apr, 2026 | 13:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Totolink A8000R cstecgi.cgi setLanguageCfg missing authentication

A vulnerability was identified in Totolink A8000R 5.9c.681_B20180413. This issue affects the function setLanguageCfg of the file /cgi-bin/cstecgi.cgi. Such manipulation of the argument langType leads to missing authentication. The attack can be launched remotely. The exploit is publicly available and might be used.

Action-Not Available
Vendor-TOTOLINK
Product-A8000R
CWE ID-CWE-287
Improper Authentication
CWE ID-CWE-306
Missing Authentication for Critical Function
CVE-2008-3203
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-4.83% / 89.52%
||
7 Day CHG~0.00%
Published-17 Jul, 2008 | 10:00
Updated-07 Aug, 2024 | 09:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

js/pages/pages_data.php in AuraCMS 2.2 through 2.2.2 does not perform authentication, which allows remote attackers to add, edit, and delete web content via a modified id parameter.

Action-Not Available
Vendor-auracmsn/a
Product-auracmsn/a
CWE ID-CWE-287
Improper Authentication
CVE-2008-3319
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.5||HIGH
EPSS-8.97% / 92.61%
||
7 Day CHG~0.00%
Published-25 Jul, 2008 | 16:00
Updated-07 Aug, 2024 | 09:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

admin/index.php in Maian Links 3.1 and earlier allows remote attackers to bypass authentication and gain administrative access by sending an arbitrary links_cookie cookie.

Action-Not Available
Vendor-maiann/a
Product-linksn/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-1006
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-7.3||HIGH
EPSS-0.07% / 21.89%
||
7 Day CHG~0.00%
Published-29 Jan, 2024 | 15:31
Updated-29 May, 2025 | 15:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Shanxi Diankeyun Technology NODERP Cookie common.php improper authentication

A vulnerability was found in Shanxi Diankeyun Technology NODERP up to 6.0.2 and classified as critical. This issue affects some unknown processing of the file application/index/common.php of the component Cookie Handler. The manipulation of the argument Nod_User_Id/Nod_User_Token leads to improper authentication. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-252275. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-shanxi_tianneng_technologyShanxi Diankeyun Technology
Product-noderpNODERP
CWE ID-CWE-287
Improper Authentication
CVE-2020-10539
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-9.8||CRITICAL
EPSS-0.38% / 59.30%
||
7 Day CHG~0.00%
Published-05 Feb, 2021 | 09:21
Updated-04 Aug, 2024 | 11:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

An issue was discovered in Epikur before 20.1.1. The Epikur server contains the checkPasswort() function that, upon user login, checks the submitted password against the user password's MD5 hash stored in the database. It is also compared to a second MD5 hash, which is the same for every user (aka a "Backdoor Password" of 3p1kursupport). If the submitted password matches either one, access is granted.

Action-Not Available
Vendor-epikurn/a
Product-epikurn/a
CWE ID-CWE-287
Improper Authentication
CVE-2024-0799
Matching Score-4
Assigner-Tenable Network Security, Inc.
ShareView Details
Matching Score-4
Assigner-Tenable Network Security, Inc.
CVSS Score-9.8||CRITICAL
EPSS-37.88% / 97.22%
||
7 Day CHG-3.14%
Published-13 Mar, 2024 | 18:57
Updated-16 Dec, 2025 | 18:13
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Authentication Bypass via wizardLogin in Arcserve Unified Data Protection

An authentication bypass vulnerability exists in Arcserve Unified Data Protection 9.2 and 8.1 in the edge-app-base-webui.jar!com.ca.arcserve.edge.app.base.ui.server.EdgeLoginServiceImpl.doLogin() function within wizardLogin.

Action-Not Available
Vendor-Arcserve, LLC
Product-udpUnified Data Protectionarcserve_unified_data_protection
CWE ID-CWE-287
Improper Authentication
CVE-2024-0988
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.17% / 37.99%
||
7 Day CHG~0.00%
Published-29 Jan, 2024 | 00:00
Updated-12 Sep, 2024 | 18:01
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Sichuan Yougou Technology KuERP common.php checklogin improper authentication

A vulnerability classified as critical was found in Sichuan Yougou Technology KuERP up to 1.0.4. Affected by this vulnerability is the function checklogin of the file /application/index/common.php. The manipulation of the argument App_User_id/App_user_Token leads to improper authentication. The exploit has been disclosed to the public and may be used. The identifier VDB-252253 was assigned to this vulnerability. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-kuerp_projectSichuan Yougou Technology
Product-kuerpKuERP
CWE ID-CWE-287
Improper Authentication
  • Previous
  • 1
  • 2
  • 3
  • ...
  • 24
  • 25
  • Next
Details not found