CVE-2023-6895

Scores

EPSS

0.932high93.2%
0%20%40%60%80%100%

Percentile: 93.2%

CVSS

9.8critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
5.8

Vector: AV:A/AC:L/Au:N/C:P/I:P/A:P

Description

A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been declared as critical. This vulnerability affects unknown code of the file /php/ping.php. The manipulation of the argument jsondata[ip] with the input netstat -ano leads to os command injection. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. VDB-248254 is the identifier assigned to this vulnerability.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-78

Exploits

Exploit ID: CVE-2023-6895

Source: github-poc

URL: https://github.com/nles-crt/CVE-2023-6895

Vulnerable Software (1)

Type: Configuration

Vendor: *

Product: intercom_broadcast_system

Operating System: * * *

Trait:
{  "children": [    {      "cpe_match": [        {          "cpe23uri": "cpe:2.3:o:hikvision:intercom_broadcast_system:*:*:*:*:*:*:*:*",          "versionEndExcluding": "4.1.0",          "versi...

Source: nvd

End of list