CVE-2026-28747
Received Received - Intake
Weak Key Generation in Milesight AIOT Cameras Enables Auth Bypass

Publication date: 2026-04-27

Last updated on: 2026-04-27

Assigner: ICS-CERT

Description
A weak key generation vulnerability exists in specific firmware versions of Milesight AIOT cameras allows authorization to be bypassed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-27
Last Modified
2026-04-27
Generated
2026-05-07
AI Q&A
2026-04-28
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
milesight aiot *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a weak key generation issue found in certain firmware versions of Milesight AIOT cameras. Because of this weakness, an attacker can bypass the authorization mechanisms of the device.


How can this vulnerability impact me? :

The vulnerability allows unauthorized access to the affected cameras by bypassing authorization. This can lead to a complete compromise of confidentiality, integrity, and availability of the device, potentially allowing attackers to view or manipulate camera data and disrupt its operation.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart