CVE-2020-36925
Published: 06 January 2026
Description
Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera…
more
streams without authorization.
Mitigating Controls (NIST 800-53 r5)AI
IA-5 requires authenticators, including session IDs, to have sufficient strength of mechanism and complexity to resist brute-force guessing attacks.
SC-23 mandates mechanisms to protect the authenticity of communications sessions, directly countering session hijacking via weak session IDs.
AC-17 requires protections for remote access sessions against hijacking, applicable to the web client allowing unauthorized remote access to camera streams.
Security SummaryAI
CVE-2020-36925 is a session hijacking vulnerability in the Arteco Web Client DVR/NVR software, stemming from insufficient session ID complexity (CWE-331). The flaw enables remote attackers to brute force session IDs within a specific numeric range, bypassing authentication mechanisms entirely. Rated at CVSS 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it poses a critical risk due to its high confidentiality, integrity, and availability impacts.
Any remote attacker can exploit this vulnerability without prerequisites like user interaction or privileges, simply by guessing valid session IDs through brute force. Successful exploitation grants unauthorized access to live camera streams, allowing attackers to view sensitive video feeds from the DVR/NVR system.
Advisories and references, including those from CXSecurity (WLB-2020120170), IBM XForce Exchange (vulnerabilities 193750 and 194139), PacketStorm (ID 160718), and the vendor site at arteco-global.com, provide further details on the issue, though specific mitigation or patch information is not detailed in the core CVE description.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables remote unauthenticated attackers to brute-force weak session IDs in a public-facing web application (Arteco Web Client DVR/NVR), hijacking sessions to bypass authentication and access live camera streams, directly facilitating T1190: Exploit Public-Facing Application.