CVE-2023-6894: CWE-200 Information Disclosure in Hikvision Intercom Broadcasting System
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability.
AI Analysis
Technical Summary
CVE-2023-6894 is an information disclosure vulnerability identified in the Hikvision Intercom Broadcasting System version 3.0.3_20201113_RELEASE(HIK). The vulnerability resides in the Log File Handler component, specifically within the file access/html/system.html. Due to improper access controls or insufficient sanitization, an attacker can manipulate requests to this component to disclose sensitive information. The vulnerability is classified under CWE-200, which relates to unintended information exposure. The CVSS v3.1 base score is 4.3 (medium severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. This means an attacker can gain access to information that should be protected but cannot alter or disrupt system operations. The vulnerability affects a specific older release of the Hikvision Intercom Broadcasting System, a product used for intercom and broadcasting communications, often deployed in physical security and building access control environments. The vendor has released version 4.1.0 to address this issue, recommending an upgrade to mitigate the risk. Although no known exploits are currently reported in the wild, the public disclosure of the exploit increases the risk of exploitation, especially in environments where the vulnerable version remains in use. Given the nature of the product, the disclosed information could include sensitive logs or configuration details that may aid further attacks or reconnaissance.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Organizations using Hikvision Intercom Broadcasting Systems in critical infrastructure, commercial buildings, or residential complexes could have sensitive operational data exposed. This information disclosure could facilitate further targeted attacks, such as social engineering or lateral movement within networks. While the vulnerability does not directly impact system integrity or availability, the leaked information might include user credentials, system configurations, or logs that could be leveraged by attackers. Given the widespread use of Hikvision products in Europe for physical security and access control, especially in sectors like transportation, government facilities, and corporate campuses, the potential impact includes erosion of trust, privacy violations, and compliance risks under regulations like GDPR if personal data is exposed. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediate upgrade to Hikvision Intercom Broadcasting System version 4.1.0 or later, as this version contains the patch for CVE-2023-6894. 2. If immediate upgrade is not feasible, restrict network access to the affected system's management interfaces to trusted internal networks only, using network segmentation and firewall rules to limit exposure. 3. Implement strict access controls and monitoring on the intercom system to detect unusual access patterns or attempts to access the vulnerable component. 4. Conduct regular audits of exposed logs and system files to identify any unauthorized information disclosure. 5. Employ intrusion detection systems (IDS) or intrusion prevention systems (IPS) with signatures or heuristics targeting known exploit attempts for this vulnerability. 6. Educate security and IT staff about the vulnerability and the importance of timely patching and monitoring. 7. Review and harden the configuration of the intercom system to minimize unnecessary services or interfaces that could be exploited.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2023-6894: CWE-200 Information Disclosure in Hikvision Intercom Broadcasting System
Description
A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability.
AI-Powered Analysis
Technical Analysis
CVE-2023-6894 is an information disclosure vulnerability identified in the Hikvision Intercom Broadcasting System version 3.0.3_20201113_RELEASE(HIK). The vulnerability resides in the Log File Handler component, specifically within the file access/html/system.html. Due to improper access controls or insufficient sanitization, an attacker can manipulate requests to this component to disclose sensitive information. The vulnerability is classified under CWE-200, which relates to unintended information exposure. The CVSS v3.1 base score is 4.3 (medium severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. This means an attacker can gain access to information that should be protected but cannot alter or disrupt system operations. The vulnerability affects a specific older release of the Hikvision Intercom Broadcasting System, a product used for intercom and broadcasting communications, often deployed in physical security and building access control environments. The vendor has released version 4.1.0 to address this issue, recommending an upgrade to mitigate the risk. Although no known exploits are currently reported in the wild, the public disclosure of the exploit increases the risk of exploitation, especially in environments where the vulnerable version remains in use. Given the nature of the product, the disclosed information could include sensitive logs or configuration details that may aid further attacks or reconnaissance.
Potential Impact
For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Organizations using Hikvision Intercom Broadcasting Systems in critical infrastructure, commercial buildings, or residential complexes could have sensitive operational data exposed. This information disclosure could facilitate further targeted attacks, such as social engineering or lateral movement within networks. While the vulnerability does not directly impact system integrity or availability, the leaked information might include user credentials, system configurations, or logs that could be leveraged by attackers. Given the widespread use of Hikvision products in Europe for physical security and access control, especially in sectors like transportation, government facilities, and corporate campuses, the potential impact includes erosion of trust, privacy violations, and compliance risks under regulations like GDPR if personal data is exposed. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.
Mitigation Recommendations
1. Immediate upgrade to Hikvision Intercom Broadcasting System version 4.1.0 or later, as this version contains the patch for CVE-2023-6894. 2. If immediate upgrade is not feasible, restrict network access to the affected system's management interfaces to trusted internal networks only, using network segmentation and firewall rules to limit exposure. 3. Implement strict access controls and monitoring on the intercom system to detect unusual access patterns or attempts to access the vulnerable component. 4. Conduct regular audits of exposed logs and system files to identify any unauthorized information disclosure. 5. Employ intrusion detection systems (IDS) or intrusion prevention systems (IPS) with signatures or heuristics targeting known exploit attempts for this vulnerability. 6. Educate security and IT staff about the vulnerability and the importance of timely patching and monitoring. 7. Review and harden the configuration of the intercom system to minimize unnecessary services or interfaces that could be exploited.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2023-12-16T15:16:07.046Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd8bad
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 8:42:59 AM
Last updated: 7/31/2025, 4:58:42 AM
Views: 11
Related Threats
CVE-2025-8878: CWE-94 Improper Control of Generation of Code ('Code Injection') in properfraction Paid Membership Plugin, Ecommerce, User Registration Form, Login Form, User Profile & Restrict Content – ProfilePress
MediumCVE-2025-8143: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in pencidesign Soledad
MediumCVE-2025-8142: CWE-98 Improper Control of Filename for Include/Require Statement in PHP Program ('PHP Remote File Inclusion') in pencidesign Soledad
HighCVE-2025-8105: CWE-94 Improper Control of Generation of Code ('Code Injection') in pencidesign Soledad
HighCVE-2025-8719: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in reubenthiessen Translate This gTranslate Shortcode
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.