CVE-2023-30466
high-risk
Published 2023-04-28
This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device. Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.
Do I need to act?
~
1.2% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
Ms-N5008-Uc Firmware
Ms-N1008-Unc Firmware
Ms-N1008-Uc Firmware
Ms-N1004-Uc Firmware
Ms-N5016-E Firmware
Ms-N5008-E Firmware
Ms-N7016-Uh Firmware
Ms-N7032-Uh Firmware
Ms-N8064-Uh Firmware
Ms-N8032-Uh Firmware
Ms-N1004-Upc Firmware
Ms-N1008-Upc Firmware
Ms-N1008-Unpc Firmware
Ms-N5008-Upc Firmware
Ms-N5016-Pe Firmware
Ms-N5008-Pe Firmware
Ms-N7016-Uph Firmware
Ms-N7032-Uph Firmware
Ms-N7048-Uph Firmware
Ms-Nxxxx-Xxg Firmware
Affected Vendors
References (2)
Third Party Advisory
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0...
Third Party Advisory
https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0...
56
/ 100
high-risk
Severity
32/34 · Critical
Exploitability
4/34 · Minimal
Exposure
20/34 · Moderate