CVE-2023-7343
Received Received - Intake
Privilege Escalation in HiSecOS Web Server Allows Admin Access

Publication date: 2026-04-02

Last updated on: 2026-04-03

Assigner: VulnCheck

Description
HiSecOS web server versions 05.0.00 to 08.3.01 prior to 08.3.02 contains a privilege escalation vulnerability that allows authenticated users with operator or auditor roles to escalate privileges to the administrator role by sending specially crafted packets to the web server. Attackers can exploit this flaw to gain full administrative access to the affected device.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-02
Last Modified
2026-04-03
Generated
2026-05-06
AI Q&A
2026-04-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
hirschmann_network_management industrial_hivision to 08.3.01 (inc)
hirschmann_network_management industrial_hivision 08.3.02
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-269 The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in HiSecOS web server allows authenticated users with operator or auditor roles to escalate their privileges to the administrator role by sending specially crafted packets to the web server.

This means that an attacker who already has some level of access can exploit this flaw to gain full administrative access to the affected device.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The CVE-2023-7343 vulnerability allows attackers to escalate privileges to administrator level, potentially compromising the confidentiality, integrity, and availability of the affected system.

Such a compromise can lead to unauthorized access and control over sensitive data and system functions, which may result in violations of compliance requirements under common standards and regulations like GDPR and HIPAA that mandate strict controls over data protection and system security.

Therefore, if exploited, this vulnerability could negatively impact an organization's ability to maintain compliance with these regulations by exposing sensitive information or disrupting critical services.


How can this vulnerability impact me? :

Exploiting this vulnerability can give an attacker full administrative access to the affected device.

With administrator privileges, the attacker can control the device completely, potentially compromising the confidentiality, integrity, and availability of the system.


What immediate steps should I take to mitigate this vulnerability?

To mitigate the CVE-2023-7343 vulnerability, users should update Industrial HiVision software to version 08.3.02 or later, where the issue is resolved.

Avoid opening manipulated Industrial HiVision Project (IHP) files that could trigger execution of arbitrary scripts or binaries.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart