CVE-2020-36925
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
3Description
Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization.
Analysis
Arteco DVR/NVR web client uses session IDs with insufficient complexity, allowing brute-force attacks to hijack active sessions and access live camera streams without authentication. PoC available.
Technical Context
Session IDs are generated from a limited numeric range (CWE-331), making brute-force feasible. An attacker can iterate through possible session values to find an active session and inherit the corresponding user's access to camera feeds and recordings.
Affected Products
Arteco Web Client DVR/NVR
Remediation
Contact Arteco for a patch. Restrict management interface to trusted networks. Implement additional network-level authentication (VPN).
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today