{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-28813","assignerOrgId":"da451dce-859b-4e51-8b87-9c8b60d19b32","state":"PUBLISHED","assignerShortName":"hikvision","dateReserved":"2023-03-23T19:49:08.440Z","datePublished":"2023-11-23T08:37:35.720Z","dateUpdated":"2024-08-02T13:51:38.639Z"},"containers":{"cna":{"descriptions":[{"lang":"en","value":"An attacker could exploit a vulnerability by sending crafted messages to computers installed with this plug-in to modify plug-in parameters, which could cause affected computers to download malicious files. "}],"affected":[{"vendor":"Hikvision","product":"LocalServiceComponents","versions":[{"version":"version 1.0.0.78 and the versions prior to it","status":"affected"}]}],"references":[{"url":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-web-browser-plug-in-locals/"}],"credits":[{"lang":"en","value":"KITRI BoB 12th","type":"finder"}],"metrics":[{"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}],"cvssV3_1":{"version":"3.1","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"HIGH","baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:H"}}],"providerMetadata":{"orgId":"da451dce-859b-4e51-8b87-9c8b60d19b32","shortName":"hikvision","dateUpdated":"2023-11-23T08:37:35.720Z"},"x_generator":{"engine":"cveClient/1.0.15"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T13:51:38.639Z"},"title":"CVE Program Container","references":[{"url":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-web-browser-plug-in-locals/","tags":["x_transferred"]}]}]}}