{"api_version":"1","generated_at":"2026-05-09T11:17:40+00:00","cve":"CVE-2026-32683","urls":{"html":"https://cve.report/CVE-2026-32683","api":"https://cve.report/api/cve/CVE-2026-32683.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-32683","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-32683"},"summary":{"title":"CVE-2026-32683","description":"Some EZVIZ products utilize older versions of cloud feature modules with legacy API interfaces, which pose a data transmission risk. Attackers can exploit this by eavesdropping on network requests to obtain data.Users are advised to upgrade the app to the latest version and enable the video encryption feature.","state":"PUBLISHED","assigner":"hikvision","published_at":"2026-05-09 09:16:08","updated_at":"2026-05-09 09:16:08"},"problem_types":[],"metrics":[{"version":"3.1","source":"hsrc@hikvision.com","type":"Secondary","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.3","severity":"MEDIUM","vector":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","data":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"}}],"references":[{"url":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-cloud-function-modules-of-some-hikvisi/","name":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-cloud-function-modules-of-some-hikvisi/","refsource":"hsrc@hikvision.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.ezviz.com/inter/trust-center/security/security-notice/2026.05.08","name":"https://www.ezviz.com/inter/trust-center/security/security-notice/2026.05.08","refsource":"hsrc@hikvision.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-32683","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-32683","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"EZVIZ","product":"EZVIZ APP","version":"affected iOS: Versions prior to 7.3.1","platforms":[]},{"source":"CNA","vendor":"EZVIZ","product":"EZVIZ APP","version":"affected Android: Versions prior to 7.3.0.0210","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Cisco Talos","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"EZVIZ APP","vendor":"EZVIZ","versions":[{"status":"affected","version":"iOS: Versions prior to 7.3.1"},{"status":"affected","version":"Android: Versions prior to 7.3.0.0210"}]}],"credits":[{"lang":"en","type":"finder","value":"Cisco Talos"}],"descriptions":[{"lang":"en","value":"Some EZVIZ products utilize older versions of cloud feature modules with legacy API interfaces, which pose a data transmission risk. Attackers can exploit this by eavesdropping on network requests to obtain data.Users are advised to upgrade the app to the latest version and enable the video encryption feature."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"ADJACENT_NETWORK","availabilityImpact":"NONE","baseScore":5.3,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"dateUpdated":"2026-05-09T08:29:09.821Z","orgId":"da451dce-859b-4e51-8b87-9c8b60d19b32","shortName":"hikvision"},"references":[{"url":"https://www.ezviz.com/inter/trust-center/security/security-notice/2026.05.08"},{"url":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerability-in-cloud-function-modules-of-some-hikvisi/"}],"x_generator":{"engine":"cveClient/1.0.15"}}},"cveMetadata":{"assignerOrgId":"da451dce-859b-4e51-8b87-9c8b60d19b32","assignerShortName":"hikvision","cveId":"CVE-2026-32683","datePublished":"2026-05-09T08:29:09.821Z","dateReserved":"2026-03-13T07:45:08.744Z","dateUpdated":"2026-05-09T08:29:09.821Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-09 09:16:08","lastModifiedDate":"2026-05-09 09:16:08","problem_types":[],"metrics":{"cvssMetricV31":[{"source":"hsrc@hikvision.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":1.6,"impactScore":3.6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"32683","Ordinal":"1","Title":"CVE-2026-32683","CVE":"CVE-2026-32683","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"32683","Ordinal":"1","NoteData":"Some EZVIZ products utilize older versions of cloud feature modules with legacy API interfaces, which pose a data transmission risk. Attackers can exploit this by eavesdropping on network requests to obtain data.Users are advised to upgrade the app to the latest version and enable the video encryption feature.","Type":"Description","Title":"CVE-2026-32683"}]}}}