What are you looking for ?
Advertise with us
RAIDON

Hikvision Security Notification: Security Vulnerability in Some Hybrid SAN/Cluster Storage Products

Having access control vulnerability which can be used to obtain admin permission

Hikvision Digital Technology Co., Ltd. had published a security advisory concerning vulnerability in its Hybrid SAN/Cluster storage products.

SN No. HSRC-202304-01
Edit: Hikvision Security Response Center (HSRC)
Initial release date: 2023-04-10

Summary
Some Hikvision Hybrid SAN/Cluster storage products have an access control vulnerability which can be used to obtain the admin permission. The attacker can exploit the vulnerability by sending crafted messages to the affected devices.

Hikvision has released a version to fix the vulnerability.

CVE ID : CVE-2023-28808
Scoring : CVSS v3 is adopted in this vulnerability scoring (http://www.first.org/cvss/specification-document)

CVE-2023-28808

Base score: 9.1(AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N)
Temporal score: 8.2 (E:P/RL:O/RC:C).

Affected versions and fixes:

Product name

Affected versions

Download patch

User manual

DS-A71024/48/72R 

Versions below V2.3.8-8 (including V2.3.8-8)

Fixing Security Vulnerability of Hybrid SAN-230407.zip

User Guide for Fixing Security Vulnerability of Hybrid SAN_230410

DS-A80624S

DS-A81016S

DS-A72024/72R

DS-A80316S

DS-A82024D

DS-A71024/48R-CVS

Versions below V1.1.4 (including V1.1.4)

Fixing Security Vulnerability of Cluster Storage-230407.zip

User Guide for Fixing Security Vulnerability of Cluster_230410

Precondition
The attacker has network access to the device.

Attack step
Send a specially crafted malicious message.

Obtaining fixed versions
Users can download patches/updates on the Hikvision official website.

Source of vulnerability information
This vulnerability is reported to HSRC by Souvik Kandar, Arko Dhar of the Redinent Innovations team in India, and we also want to acknowledge the cooperation of the National Computer Emergency Response Team of India (CERT-In) who coordinated with us to handle this vulnerability.

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E