CVE-2026-3828
Summary
| CVE | CVE-2026-3828 |
|---|---|
| State | PUBLISHED |
| Assigner | hikvision |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-09 09:16:09 UTC |
| Updated | 2026-05-09 09:16:09 UTC |
| Description | Some Hikvision switch products (discontinued since December 2023) are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution. |
Risk And Classification
Primary CVSS: v3.1 7.2 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Secondary | 7.2 | HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| 3.1 | CNA | CVSS | 7.2 | HIGH | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
HighUser Interaction
NoneScope
UnchangedConfidentiality
HighIntegrity
HighAvailability
HighCVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Hikvision | DS-3E1310P-SI | affected Versions below V1.2.4_210623 (including V1.2.4_210623) | Not specified |
| CNA | Hikvision | DS-3E1318P-SI | affected Versions below V1.2.0_210823 (including V1.2.0_210823) | Not specified |
| CNA | Hikvision | DS-3E1326P-SI | affected Versions below V1.2.0_210823 (including V1.2.0_210823) | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| www.hikvision.com/en/support/cybersecurity/security-advisory/command-execution-... | [email protected] | www.hikvision.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: Thiago Torres (torresm) (en)
There are currently no legacy QID mappings associated with this CVE.