CVE-2026-28747
Received
Received - Intake
Weak Key Generation in Milesight AIOT Cameras Enables Auth Bypass
Publication date: 2026-04-27
Last updated on: 2026-04-27
Assigner: ICS-CERT
Description
Description
A weak key generation vulnerability exists in specific firmware versions of Milesight AIOT cameras allows authorization to be bypassed.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| milesight | aiot | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-639 | The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a weak key generation issue found in certain firmware versions of Milesight AIOT cameras. Because of this weakness, an attacker can bypass the authorization mechanisms of the device.
How can this vulnerability impact me? :
The vulnerability allows unauthorized access to the affected cameras by bypassing authorization. This can lead to a complete compromise of confidentiality, integrity, and availability of the device, potentially allowing attackers to view or manipulate camera data and disrupt its operation.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70