Vulnerability Description
An authentication bypass vulnerability in the Direct Connection Module in Ezviz CS-C6N-xxx prior to v5.3.x build 20230401, Ezviz CS-CV310-xxx prior to v5.3.x build 20230401, Ezviz CS-C6CN-xxx prior to v5.3.x build 20230401, Ezviz CS-C3N-xxx prior to v5.3.x build 20230401 allows remote attackers to obtain sensitive information by sending crafted messages to the affected devices.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Ezviz | Cs-C6N-A0-1C2Wfr Firmware | - |
| Ezviz | Cs-C6N-A0-1C2Wfr | - |
| Ezviz | Cs-Cv310-A0-1C2Wfr Firmware | - |
| Ezviz | Cs-Cv310-A0-1C2Wfr | - |
| Ezviz | Cs-C6Cn-A0-3H2Wfr Firmware | - |
| Ezviz | Cs-C6Cn-A0-3H2Wfr | - |
| Ezviz | Cs-C3N-A0-3H2Wfrl Firmware | - |
| Ezviz | Cs-C3N-A0-3H2Wfrl | - |
Related Weaknesses (CWE)
References
- https://joerngermany.github.io/ezviz_vulnerability/
- https://www.ezviz.com/data-security/security-notice/detail/911Vendor Advisory
- https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vu
- https://joerngermany.github.io/ezviz_vulnerability/
- https://www.ezviz.com/data-security/security-notice/detail/911Vendor Advisory
- https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vu
FAQ
What is CVE-2023-48121?
CVE-2023-48121 is a vulnerability with a CVSS score of 5.3 (MEDIUM). An authentication bypass vulnerability in the Direct Connection Module in Ezviz CS-C6N-xxx prior to v5.3.x build 20230401, Ezviz CS-CV310-xxx prior to v5.3.x build 20230401, Ezviz CS-C6CN-xxx prior to...
How severe is CVE-2023-48121?
CVE-2023-48121 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48121?
Check the references section above for vendor advisories and patch information. Affected products include: Ezviz Cs-C6N-A0-1C2Wfr Firmware, Ezviz Cs-C6N-A0-1C2Wfr, Ezviz Cs-Cv310-A0-1C2Wfr Firmware, Ezviz Cs-Cv310-A0-1C2Wfr, Ezviz Cs-C6Cn-A0-3H2Wfr Firmware.