CVE-2024-25063

Due to insufficient server-side validation, a successful exploit of this vulnerability could allow an attacker to gain access to certain URLs that the attacker should not have access to.
Configurations

Configuration 1 (hide)

cpe:2.3:a:hikvision:hikcentral_professional:*:*:*:*:*:*:*:*

History

21 Nov 2024, 09:00

Type Values Removed Values Added
Summary
  • (es) Debido a una validación insuficiente del lado del servidor, una explotación exitosa de esta vulnerabilidad podría permitir a un atacante obtener acceso a determinadas URL a las que no debería tener acceso.
References () https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-professional/ - Vendor Advisory () https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-professional/ - Vendor Advisory

04 Mar 2024, 22:45

Type Values Removed Values Added
CPE cpe:2.3:a:hikvision:hikcentral_professional:*:*:*:*:*:*:*:*
CWE NVD-CWE-noinfo
References () https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-professional/ - () https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-professional/ - Vendor Advisory
First Time Hikvision
Hikvision hikcentral Professional

02 Mar 2024, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-03-02 03:15

Updated : 2024-11-21 09:00


NVD link : CVE-2024-25063

Mitre link : CVE-2024-25063

CVE.ORG link : CVE-2024-25063


JSON object : View

Products Affected

hikvision

  • hikcentral_professional