{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2023-6894","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2023-12-16T15:16:07.046Z","datePublished":"2023-12-17T07:31:03.712Z","dateUpdated":"2025-05-07T20:41:21.185Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2023-12-19T09:06:40.842Z"},"title":"Hikvision Intercom Broadcasting System Log File system.html information disclosure","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-200","lang":"en","description":"CWE-200 Information Disclosure"}]}],"affected":[{"vendor":"Hikvision","product":"Intercom Broadcasting System","versions":[{"version":"3.0.3_20201113_RELEASE(HIK)","status":"affected"}],"modules":["Log File Handler"]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability."},{"lang":"de","value":"Es wurde eine Schwachstelle in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK) ausgemacht. Sie wurde als problematisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Datei access/html/system.html der Komponente Log File Handler. Mittels dem Manipulieren mit unbekannten Daten kann eine information disclosure-Schwachstelle ausgenutzt werden. Der Exploit steht zur öffentlichen Verfügung. Ein Aktualisieren auf die Version 4.1.0 vermag dieses Problem zu lösen. Als bestmögliche Massnahme wird das Einspielen eines Upgrades empfohlen."}],"metrics":[{"cvssV3_1":{"version":"3.1","baseScore":4.3,"vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV3_0":{"version":"3.0","baseScore":4.3,"vectorString":"CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N","baseSeverity":"MEDIUM"}},{"cvssV2_0":{"version":"2.0","baseScore":3.3,"vectorString":"AV:A/AC:L/Au:N/C:P/I:N/A:N"}}],"timeline":[{"time":"2023-12-16T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2023-12-16T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2023-12-19T10:08:07.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"willchen","type":"finder"},{"lang":"en","value":"willchen (VulDB User)","type":"analyst"}],"references":[{"url":"https://vuldb.com/?id.248253","tags":["vdb-entry"]},{"url":"https://vuldb.com/?ctiid.248253","tags":["signature","permissions-required"]},{"url":"https://github.com/willchen0011/cve/blob/main/unaccess.md","tags":["exploit"]}]},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-02T08:42:08.429Z"},"title":"CVE Program Container","references":[{"url":"https://vuldb.com/?id.248253","tags":["vdb-entry","x_transferred"]},{"url":"https://vuldb.com/?ctiid.248253","tags":["signature","permissions-required","x_transferred"]},{"url":"https://github.com/willchen0011/cve/blob/main/unaccess.md","tags":["exploit","x_transferred"]}]},{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-05-07T20:41:09.788330Z","id":"CVE-2023-6894","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-05-07T20:41:21.185Z"}}]}}