CVE-2026-42365
Published: 04 May 2026
Description
A guessable session cookie vulnerability exists in the Web Interface functionality of GeoVision LPC2011/LPC2211 1.10. A specially crafted series of HTTP requests can lead to an authentication bypas. An attacker can bruteforce session cookies to trigger this vulnerability.
Mitigating Controls (NIST 800-53 r5)AI
Directly requires management of authenticators including session cookies with sufficient entropy, randomness, and protection to prevent them from being guessable via brute-force.
Limits consecutive unsuccessful authentication attempts, mitigating brute-force attacks on session cookies even if partially guessable.
Provides mechanisms to ensure the authenticity of web communications sessions, reducing the risk of exploitation through guessed or unauthorized session cookies.
Security SummaryAI
CVE-2026-42365 is a guessable session cookie vulnerability in the Web Interface functionality of GeoVision LPC2011/LPC2211 version 1.10, published on 2026-05-04T01:16:03.620. The issue allows a specially crafted series of HTTP requests to lead to an authentication bypass, where an attacker can bruteforce session cookies to trigger the vulnerability. It has a CVSS v3.1 base score of 8.6 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N) and is associated with CWE-341.
Any unauthenticated attacker with network access can exploit this vulnerability due to its low attack complexity, lack of required privileges or user interaction, and network vector. Successful exploitation enables bruteforcing of session cookies to bypass authentication, resulting in high confidentiality impact across a scoped security boundary.
Advisories with potential mitigation details are available from Talos Intelligence at https://talosintelligence.com/vulnerability_reports/ and GeoVision at https://www.geovision.com.tw/cyber_security.php.
Details
- CWE(s)
Affected Products
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Vulnerability in public web interface directly enables remote exploitation (T1190) via crafted HTTP requests; guessable session cookies facilitate brute-force guessing to achieve authentication bypass (T1110).