{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-30466","assignerOrgId":"66834db9-ab24-42b4-be80-296b2e40335c","state":"PUBLISHED","assignerShortName":"CERT-In","dateReserved":"2023-04-10T10:20:17.200Z","datePublished":"2023-04-28T10:06:26.684Z","dateUpdated":"2025-01-30T17:16:05.788Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"NVR MS-Nxxxx-xxG","vendor":"Milesight","versions":[{"lessThan":"77.9.0.18-r2","status":"affected","version":"77.X","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NVR MS-Nxxxx-xxE","vendor":"Milesight","versions":[{"lessThan":"75.9.0.18-r2","status":"affected","version":"75.X","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NVR MS-Nxxxx-xxT","vendor":"Milesight","versions":[{"lessThan":"72.9.0.18-r2","status":"affected","version":"72.X","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NVR MS-Nxxxx-xxH ","vendor":"Milesight","versions":[{"lessThan":"71.9.0.18-r2","status":"affected","version":"71.X","versionType":"custom"}]},{"defaultStatus":"unaffected","product":"NVR MS-Nxxxx-xxC","vendor":"Milesight","versions":[{"lessThan":"73.9.0.18-r2","status":"affected","version":"73.X","versionType":"custom"}]}],"credits":[{"lang":"en","type":"reporter","value":"This vulnerability is reported by Souvik Kandar and Arko Dhar from Redinent Innovations Engineering & Research Team, Karnataka, India."}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.<br><br>Successful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.<br></p><p><b></b></p>\n\n\n\n\n\n<b></b><b></b>"}],"value":"This vulnerability exists in Milesight 4K/H.265 Series NVR models (MS-Nxxxx-xxG, MS-Nxxxx-xxE, MS-Nxxxx-xxT, MS-Nxxxx-xxH and MS-Nxxxx-xxC), due to a weak password reset mechanism at the Milesight NVR web-based management interface. A remote attacker could exploit this vulnerability by sending a specially crafted http requests on the targeted device.\n\nSuccessful exploitation of this vulnerability could allow remote attacker to account takeover on the targeted device.\n\n\n\n\n\n\n\n\n\n\n"}],"impacts":[{"capecId":"CAPEC-50","descriptions":[{"lang":"en","value":"CAPEC-50 Password Recovery Exploitation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":9.8,"baseSeverity":"CRITICAL","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-640","description":"CWE-640 Weak Password Recovery Mechanism for Forgotten Password","lang":"en","type":"CWE"}]}],"references":[{"url":"https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0121"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Update\nMilesight NVR firmware to latest version &nbsp;</p><p><a target=\"_blank\" rel=\"nofollow\" href=\"https://www.milesight.com/support/download/firmware\">https://www.milesight.com/support/download/firmware</a></p>\n\n\n\n\n\n\n\n<br>"}],"value":"Update\nMilesight NVR firmware to latest version  \n\n https://www.milesight.com/support/download/firmware https://www.milesight.com/support/download/firmware \n\n\n\n\n\n\n\n\n\n\n"}],"source":{"discovery":"UNKNOWN"},"title":"Authentication Bypass Vulnerability in Milesight Network Video Recorder (NVR)","providerMetadata":{"orgId":"66834db9-ab24-42b4-be80-296b2e40335c","shortName":"CERT-In","dateUpdated":"2023-04-28T10:06:26.684Z"}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T14:28:50.581Z"},"title":"CVE Program Container","references":[{"url":"https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2023-0121","tags":["x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-01-30T17:15:10.264699Z","id":"CVE-2023-30466","options":[{"Exploitation":"none"},{"Automatable":"yes"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-01-30T17:16:05.788Z"}}]}}