{"api_version":"1","generated_at":"2026-05-09T11:16:55+00:00","cve":"CVE-2026-3828","urls":{"html":"https://cve.report/CVE-2026-3828","api":"https://cve.report/api/cve/CVE-2026-3828.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-3828","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-3828"},"summary":{"title":"CVE-2026-3828","description":"Some Hikvision switch products (discontinued since December 2023) are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.","state":"PUBLISHED","assigner":"hikvision","published_at":"2026-05-09 09:16:09","updated_at":"2026-05-09 09:16:09"},"problem_types":[],"metrics":[{"version":"3.1","source":"hsrc@hikvision.com","type":"Secondary","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"7.2","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}}],"references":[{"url":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/command-execution-vulnerability-in-some-hikvision-switch-product/","name":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/command-execution-vulnerability-in-some-hikvision-switch-product/","refsource":"hsrc@hikvision.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-3828","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-3828","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Hikvision","product":"DS-3E1310P-SI","version":"affected Versions below V1.2.4_210623 (including V1.2.4_210623)","platforms":[]},{"source":"CNA","vendor":"Hikvision","product":"DS-3E1318P-SI","version":"affected Versions below V1.2.0_210823 (including V1.2.0_210823)","platforms":[]},{"source":"CNA","vendor":"Hikvision","product":"DS-3E1326P-SI","version":"affected Versions below V1.2.0_210823 (including V1.2.0_210823)","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"Thiago Torres (torresm)","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"product":"DS-3E1310P-SI","vendor":"Hikvision","versions":[{"status":"affected","version":"Versions below V1.2.4_210623 (including V1.2.4_210623)"}]},{"product":"DS-3E1318P-SI","vendor":"Hikvision","versions":[{"status":"affected","version":"Versions below V1.2.0_210823 (including V1.2.0_210823)"}]},{"product":"DS-3E1326P-SI","vendor":"Hikvision","versions":[{"status":"affected","version":"Versions below V1.2.0_210823 (including V1.2.0_210823)"}]}],"credits":[{"lang":"en","type":"finder","value":"Thiago Torres (torresm)"}],"descriptions":[{"lang":"en","value":"Some Hikvision switch products (discontinued since December 2023) are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution."}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.2,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"providerMetadata":{"dateUpdated":"2026-05-09T08:27:55.964Z","orgId":"da451dce-859b-4e51-8b87-9c8b60d19b32","shortName":"hikvision"},"references":[{"url":"https://www.hikvision.com/en/support/cybersecurity/security-advisory/command-execution-vulnerability-in-some-hikvision-switch-product/"}],"x_generator":{"engine":"cveClient/1.0.15"}}},"cveMetadata":{"assignerOrgId":"da451dce-859b-4e51-8b87-9c8b60d19b32","assignerShortName":"hikvision","cveId":"CVE-2026-3828","datePublished":"2026-05-09T08:27:55.964Z","dateReserved":"2026-03-09T09:20:38.428Z","dateUpdated":"2026-05-09T08:27:55.964Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-09 09:16:09","lastModifiedDate":"2026-05-09 09:16:09","problem_types":[],"metrics":{"cvssMetricV31":[{"source":"hsrc@hikvision.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":7.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.2,"impactScore":5.9}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"3828","Ordinal":"1","Title":"CVE-2026-3828","CVE":"CVE-2026-3828","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"3828","Ordinal":"1","NoteData":"Some Hikvision switch products (discontinued since December 2023) are vulnerable to authenticated remote command execution due to insufficient input validation. Attackers with valid credentials can exploit this flaw by sending crafted packets containing malicious commands to affected devices, leading to arbitrary command execution.","Type":"Description","Title":"CVE-2026-3828"}]}}}