A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
Published 2021-09-22 13:15:08
Updated 2022-10-27 21:18:55
View at NVD,   CVE.org

Products affected by CVE-2021-36260

Max 200 conditions are displayed on this page, to prevent potential performance issues, please refer to NVD for more details.

CVE-2021-36260 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
Hikvision Improper Input Validation
CISA required action:
Apply updates per vendor instructions.
CISA description:
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2021-36260
Added on 2022-01-10 Action due date 2022-01-24

Exploit prediction scoring system (EPSS) score for CVE-2021-36260

97.46%
Probability of exploitation activity in the next 30 days EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2021-36260

  • Hikvision IP Camera Unauthenticated Command Injection
    Disclosure Date: 2021-09-18
    First seen: 2022-12-23
    exploit/linux/http/hikvision_cve_2021_36260_blind
    This module exploits an unauthenticated command injection in a variety of Hikvision IP cameras (CVE-2021-36260). The module inserts a command into an XML payload used with an HTTP PUT request sent to the `/SDK/webLanguage` endpoint, resulting in command execution

CVSS scores for CVE-2021-36260

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen
9.3
HIGH AV:N/AC:M/Au:N/C:C/I:C/A:C
8.6
10.0
NIST
9.8
CRITICAL CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
3.9
5.9
NIST

CWE ids for CVE-2021-36260

References for CVE-2021-36260

Jump to
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!