{"uuid": "55ec2f0e-b0c0-4fd5-9524-a9ae6b300e21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-48121", "type": "seen", "source": "https://t.me/tengkorakcybercrew/10453", "content": "CVE-2023-48121: Auth Bypass in Hikvision, 8.2 rating \u2757\ufe0f\n\nSome Hikvision products have been affected by an authentication bypass vulnerability in the Hik-Connect Module, which could allow remote attackers to consume services by sending crafted messages to the affected devices.\n\nSearch at Netlas.io:\n\ud83d\udc49\ud83c\udffb Link: https://nt.ls/hbCPs\n\ud83d\udc49\ud83c\udffb Dork: http.favicon.hash_sha256:7d249b2fca8ab8d5ab373444732b8bc9104ab597976640f3441ddfd70148b527\n\nVendor's advisory: https://www.hikvision.com/hk/support/cybersecurity/security-advisory/security-vulnerability-in-some-hikvision-products/\n\nJoin us:\n\nJoin us\ud83d\udc79\ud83d\udc79:-https://t.me/suboxo\ud83d\udc7a\ud83d\udc7a", "creation_timestamp": "2024-06-03T23:12:35.000000Z"}