First published: Mon Jun 27 2022(Updated: )
The web module in some Hikvision Hybrid SAN/Cluster Storage products have the following security vulnerability. Due to the insufficient input validation, attacker can exploit the vulnerability to XSS attack by sending messages with malicious commands to the affected device.
Credit: hsrc@hikvision.com
Affected Software | Affected Version | How to fix |
---|---|---|
Hikvision DS-A71024 | <=2.3.8-6 | |
Hikvision DS-A71024 Firmware | ||
Hikvision DS-A71048 Firmware | <=2.3.8-6 | |
Hikvision DS-A71048 | ||
Hikvision DS-A71072R Firmware | <=2.3.8-6 | |
Hikvision DS-A71072R Firmware | ||
Hikvision DS-A80624S Firmware | <=2.3.8-6 | |
Hikvision DS-A80624S Firmware | ||
Hikvision DS-A81016S | <=2.3.8-6 | |
Hikvision DS-A81016S Firmware | ||
Hikvision DS-A72024 | <=2.3.8-6 | |
Hikvision DS-A72024 Firmware | ||
Hikvision DS-A72072R | <=2.3.8-6 | |
Hikvision DS-A72072R Firmware | ||
Hikvision DS-A80316S | <=2.3.8-6 | |
Hikvision DS-A80316S | ||
Hikvision DS-A82024D | <=2.3.8-6 | |
Hikvision DS-A82024D Firmware | ||
Hikvision DS-A71024 | <=1.1.4 | |
Hikvision DS-A71048R-CVS | <=1.1.4 | |
Hikvision DS-A71048R-CVS Firmware | ||
Hikvision DS-A72024 | <=1.1.4 | |
Hikvision DS-A72048R-CVS | <=1.1.4 | |
Hikvision DS-A72048R-CVS Firmware |
https://www.hikvision.com/content/dam/hikvision/en/support/cybersecyrity/security-advisory/Patch-for-Fixing-Security-Vulnerability-of-Hybrid-SAN-&-Cluster-Storage.zip
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security vulnerability is CVE-2022-28172.
The severity level of CVE-2022-28172 is medium with a CVSS score of 6.1.
The affected software for CVE-2022-28172 includes some Hikvision Hybrid SAN/Cluster Storage products with specific firmware versions.
An attacker can exploit CVE-2022-28172 by sending messages with malicious commands to the affected device, leading to XSS attacks.
Yes, there are references available for CVE-2022-28172. You can find them at the following links: [link1](http://packetstormsecurity.com/files/170818/Hikvision-Remote-Code-Execution-XSS-SQL-Injection.html) and [link2](https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-hybrid-san-products/).