Skip to main content

CVE-2023-6894: CWE-200 Information Disclosure in Hikvision Intercom Broadcasting System

Medium
VulnerabilityCVE-2023-6894cvecve-2023-6894cwe-200
Published: Sun Dec 17 2023 (12/17/2023, 07:31:03 UTC)
Source: CVE
Vendor/Project: Hikvision
Product: Intercom Broadcasting System

Description

A vulnerability was found in Hikvision Intercom Broadcasting System 3.0.3_20201113_RELEASE(HIK). It has been classified as problematic. This affects an unknown part of the file access/html/system.html of the component Log File Handler. The manipulation leads to information disclosure. The exploit has been disclosed to the public and may be used. Upgrading to version 4.1.0 is able to address this issue. It is recommended to upgrade the affected component. The identifier VDB-248253 was assigned to this vulnerability.

AI-Powered Analysis

AILast updated: 07/05/2025, 08:42:59 UTC

Technical Analysis

CVE-2023-6894 is an information disclosure vulnerability identified in the Hikvision Intercom Broadcasting System version 3.0.3_20201113_RELEASE(HIK). The vulnerability resides in the Log File Handler component, specifically within the file access/html/system.html. Due to improper access controls or insufficient sanitization, an attacker can manipulate requests to this component to disclose sensitive information. The vulnerability is classified under CWE-200, which relates to unintended information exposure. The CVSS v3.1 base score is 4.3 (medium severity), with an attack vector of adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. This means an attacker can gain access to information that should be protected but cannot alter or disrupt system operations. The vulnerability affects a specific older release of the Hikvision Intercom Broadcasting System, a product used for intercom and broadcasting communications, often deployed in physical security and building access control environments. The vendor has released version 4.1.0 to address this issue, recommending an upgrade to mitigate the risk. Although no known exploits are currently reported in the wild, the public disclosure of the exploit increases the risk of exploitation, especially in environments where the vulnerable version remains in use. Given the nature of the product, the disclosed information could include sensitive logs or configuration details that may aid further attacks or reconnaissance.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality. Organizations using Hikvision Intercom Broadcasting Systems in critical infrastructure, commercial buildings, or residential complexes could have sensitive operational data exposed. This information disclosure could facilitate further targeted attacks, such as social engineering or lateral movement within networks. While the vulnerability does not directly impact system integrity or availability, the leaked information might include user credentials, system configurations, or logs that could be leveraged by attackers. Given the widespread use of Hikvision products in Europe for physical security and access control, especially in sectors like transportation, government facilities, and corporate campuses, the potential impact includes erosion of trust, privacy violations, and compliance risks under regulations like GDPR if personal data is exposed. The medium severity rating suggests that while the vulnerability is not critical, it should be addressed promptly to prevent escalation or chaining with other vulnerabilities.

Mitigation Recommendations

1. Immediate upgrade to Hikvision Intercom Broadcasting System version 4.1.0 or later, as this version contains the patch for CVE-2023-6894. 2. If immediate upgrade is not feasible, restrict network access to the affected system's management interfaces to trusted internal networks only, using network segmentation and firewall rules to limit exposure. 3. Implement strict access controls and monitoring on the intercom system to detect unusual access patterns or attempts to access the vulnerable component. 4. Conduct regular audits of exposed logs and system files to identify any unauthorized information disclosure. 5. Employ intrusion detection systems (IDS) or intrusion prevention systems (IPS) with signatures or heuristics targeting known exploit attempts for this vulnerability. 6. Educate security and IT staff about the vulnerability and the importance of timely patching and monitoring. 7. Review and harden the configuration of the intercom system to minimize unnecessary services or interfaces that could be exploited.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2023-12-16T15:16:07.046Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd8bad

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 8:42:59 AM

Last updated: 7/31/2025, 4:58:42 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats