CVE-2020-36925

CRITICAL
2026-01-06 [email protected]
9.8
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
PoC Detected
Jan 08, 2026 - 18:09 vuln.today
Public exploit code
CVE Published
Jan 06, 2026 - 16:15 nvd
CRITICAL 9.8

Description

Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization.

Analysis

Arteco DVR/NVR web client uses session IDs with insufficient complexity, allowing brute-force attacks to hijack active sessions and access live camera streams without authentication. PoC available.

Technical Context

Session IDs are generated from a limited numeric range (CWE-331), making brute-force feasible. An attacker can iterate through possible session values to find an active session and inherit the corresponding user's access to camera feeds and recordings.

Affected Products

Arteco Web Client DVR/NVR

Remediation

Contact Arteco for a patch. Restrict management interface to trusted networks. Implement additional network-level authentication (VPN).

Priority Score

69
Low Medium High Critical
KEV: 0
EPSS: +0.5
CVSS: +49
POC: +20

Share

CVE-2020-36925 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy