Cyber Posture

CVE-2020-36925

CriticalPublic PoC

Published: 06 January 2026

Published
06 January 2026
Modified
15 April 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0061 69.8th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Description

Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera…

more

streams without authorization.

Mitigating Controls (NIST 800-53 r5)AI

prevent

IA-5 requires authenticators, including session IDs, to have sufficient strength of mechanism and complexity to resist brute-force guessing attacks.

preventdetect

SC-23 mandates mechanisms to protect the authenticity of communications sessions, directly countering session hijacking via weak session IDs.

prevent

AC-17 requires protections for remote access sessions against hijacking, applicable to the web client allowing unauthorized remote access to camera streams.

Security SummaryAI

CVE-2020-36925 is a session hijacking vulnerability in the Arteco Web Client DVR/NVR software, stemming from insufficient session ID complexity (CWE-331). The flaw enables remote attackers to brute force session IDs within a specific numeric range, bypassing authentication mechanisms entirely. Rated at CVSS 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it poses a critical risk due to its high confidentiality, integrity, and availability impacts.

Any remote attacker can exploit this vulnerability without prerequisites like user interaction or privileges, simply by guessing valid session IDs through brute force. Successful exploitation grants unauthorized access to live camera streams, allowing attackers to view sensitive video feeds from the DVR/NVR system.

Advisories and references, including those from CXSecurity (WLB-2020120170), IBM XForce Exchange (vulnerabilities 193750 and 194139), PacketStorm (ID 160718), and the vendor site at arteco-global.com, provide further details on the issue, though specific mitigation or patch information is not detailed in the core CVE description.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability enables remote unauthenticated attackers to brute-force weak session IDs in a public-facing web application (Arteco Web Client DVR/NVR), hijacking sessions to bypass authentication and access live camera streams, directly facilitating T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

References