Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32683: Vulnerability in EZVIZ EZVIZ APP

0
Medium
VulnerabilityCVE-2026-32683cvecve-2026-32683
Published: Sat May 09 2026 (05/09/2026, 08:29:09 UTC)
Source: CVE Database V5
Vendor/Project: EZVIZ
Product: EZVIZ APP

Description

Certain versions of the EZVIZ APP prior to iOS 7. 3. 1 and Android 7. 3. 0. 0210 use outdated cloud feature modules with legacy API interfaces that create a risk of data exposure. Attackers could potentially eavesdrop on network requests to intercept transmitted data. The vulnerability primarily affects confidentiality but does not impact integrity or availability. Users are advised to upgrade to the latest app versions and enable video encryption to mitigate this risk. No official patch or vendor advisory is currently provided to confirm remediation status.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/09/2026, 09:21:30 UTC

Technical Analysis

CVE-2026-32683 describes a medium-severity vulnerability in the EZVIZ APP where older versions use legacy API interfaces in cloud feature modules, leading to insecure data transmission. This allows attackers to eavesdrop on network communications and obtain sensitive data. The vulnerability affects iOS versions prior to 7.3.1 and Android versions prior to 7.3.0.0210. The CVSS 3.1 score is 5.3, reflecting a network attack vector with high confidentiality impact but requiring high attack complexity and no privileges or user interaction. No official remediation level or patch information is available, and no known exploits are reported in the wild.

Potential Impact

The vulnerability allows attackers to intercept and obtain sensitive data transmitted between the EZVIZ APP and cloud services due to insecure legacy API usage. This compromises confidentiality but does not affect data integrity or availability. The medium CVSS score reflects the moderate risk posed by this eavesdropping capability, given the high attack complexity and lack of required privileges.

Mitigation Recommendations

Users should upgrade the EZVIZ APP to the latest available versions (iOS 7.3.1 or later, Android 7.3.0.0210 or later) to address this vulnerability. Additionally, enabling the video encryption feature within the app is recommended to protect data transmissions. Patch status is not explicitly confirmed by the vendor; therefore, users should monitor official EZVIZ communications for updates and advisories.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
hikvision
Date Reserved
2026-03-13T07:45:08.744Z
Cvss Version
3.1
State
PUBLISHED
Remediation Level
null

Threat ID: 69fef90fcbff5d8610f4b2f2

Added to database: 5/9/2026, 9:06:23 AM

Last enriched: 5/9/2026, 9:21:30 AM

Last updated: 5/9/2026, 12:21:22 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses