Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-36523: n/a

0
Medium
VulnerabilityCVE-2024-36523cvecve-2024-36523
Published: Wed Jun 12 2024 (06/12/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An access control issue in Wvp GB28181 Pro 2.0 allows users to continue to access information in the application after deleting their own or administrator accounts. This is provided that the users do not log out of their deleted accounts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 03:26:10 UTC

Technical Analysis

CVE-2024-36523 identifies an access control vulnerability in Wvp GB28181 Pro 2.0, a video management platform implementing the GB28181 protocol commonly used in surveillance systems. The issue stems from improper session management: when a user deletes their own or an administrator account, the application does not invalidate the active session or access tokens associated with that account. As a result, the user can continue to access sensitive information within the application until they explicitly log out. This flaw corresponds to CWE-613 (Insufficient Session Expiration). The vulnerability requires network access and low privileges (PR:L) but no user interaction, making it relatively straightforward to exploit if an attacker has valid credentials. The CVSS v3.1 score of 6.5 reflects a medium severity due to the high confidentiality impact (unauthorized data access) but no impact on integrity or availability. No patches or fixes have been released at the time of publication, and no known exploits have been reported in the wild. This vulnerability highlights a critical gap in session and access token lifecycle management, which is essential for secure account deletion and access revocation in multi-user applications.

Potential Impact

The primary impact of this vulnerability is unauthorized access to sensitive information within the Wvp GB28181 Pro 2.0 application after account deletion. Attackers or users who delete their accounts but maintain active sessions can continue to view or extract confidential data, potentially including video feeds, user information, or system configurations. This compromises confidentiality and could lead to data leakage or privacy violations. Since the vulnerability does not affect data integrity or system availability, the risk is limited to information exposure. However, given the use of GB28181 in surveillance and security systems, unauthorized access could have serious operational and privacy consequences. Organizations relying on this software for critical monitoring or security functions may face compliance issues and reputational damage if sensitive data is exposed. The lack of patches and known exploits suggests the threat is currently theoretical but could become practical if attackers develop exploits or insiders abuse the flaw.

Mitigation Recommendations

Until an official patch is released, organizations should implement several specific mitigations: 1) Enforce immediate session termination upon account deletion by manually invalidating active sessions or tokens through administrative controls or backend database operations. 2) Restrict account deletion privileges to highly trusted administrators to minimize the risk of abuse. 3) Implement monitoring and alerting for unusual access patterns from accounts marked for deletion. 4) Encourage users to log out immediately after deleting accounts to prevent continued access. 5) Review and enhance session management policies to ensure tokens are invalidated on account status changes. 6) If possible, deploy network-level access controls to limit exposure of the application to trusted networks only. 7) Stay alert for vendor updates or patches addressing this vulnerability and apply them promptly. These measures go beyond generic advice by focusing on session lifecycle management and administrative controls specific to this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-05-30T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6c5db7ef31ef0b5635c4

Added to database: 2/25/2026, 9:40:45 PM

Last enriched: 2/28/2026, 3:26:10 AM

Last updated: 4/11/2026, 7:10:14 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses