Sploit.io - Search

Product: P1/P2, version: >= All, <= 4.8.2605

CVE-2023-41917

Severity: CRITICAL

Description: Inadequate input validation exposes the system to potential remote code execution (RCE) risks. Attackers can exploit this vulnerability by appending shell commands to the Speed-Measurement feature, enabling unauthorized code execution.

CVSS Score: 10

Priority

B

CISA Data

EPSS Data

  • EPSS: 0.025000000
  • Percentile: 0.853600000
  • Date: 2026-04-19

ExploitDB

No data available.

HackerOne Data

  • Rank: 9116
  • Reports submitted count: 0
  • Unknown: 0
  • None: 0
  • Low: 0
  • Medium: 0
  • High: 0
  • Critical: 0

GitHub PoCs

    Nuclei Templates

    No data available.

    VulnCheck Data

    Affected Products:

    • Kiloview P1/P2 - Versions: All

    References:

    Risk Assessment

    1. Risk Assessment
    The vulnerability, identified as CVE-2023-41917, is a critical remote code execution (RCE) vulnerability affecting Kiloview P1/P2 video encoders. The core issue is inadequate input validation within the Speed-Measurement feature, allowing attackers to inject shell commands. Given the CVSS score of 10, this is considered a highly severe vulnerability. The likelihood of exploitation is relatively high as the attack vector is network-accessible and requires no user interaction. The ease of exploitation is also considered low, suggesting a straightforward attack process. The potential impact on confidentiality, integrity, and availability is high. Successful exploitation could lead to full system compromise, potentially enabling attackers to steal sensitive data, modify system configurations, or disrupt video streaming services. Business impact could include loss of video feeds, potential data breaches, and damage to reputation. The EPSS score of 0.025000000 indicates a relatively low, but not insignificant, probability of exploitation in the wild.

    2. Potential Attack Scenarios
    An attacker can exploit this vulnerability by sending a crafted request to the Speed-Measurement feature of the Kiloview P1/P2 device. For example, an attacker could append a shell command, such as `whoami`, to the Speed-Measurement input. This command will then be executed on the device with the privileges of the process handling the Speed-Measurement feature. The attacker could then escalate privileges further if needed.
    Attack Vector: Network (internet-facing or within the local network).
    Attack Process:
    1. Attacker identifies a vulnerable Kiloview P1/P2 device.
    2. Attacker sends a specially crafted HTTP request to the Speed-Measurement endpoint, embedding a shell command.
    3. The Kiloview device executes the embedded shell command.
    4. The attacker receives the output of the command, confirming successful execution.
    Potential Outcomes: Successful execution of the shell command allows the attacker to execute arbitrary code on the device. This can lead to full system compromise, data exfiltration, denial of service, or the installation of malware. The attacker could potentially gain control of the video stream or use the device as a pivot point to attack other systems on the network.

    3. Mitigation Recommendations
    Immediate action should be taken to patch all vulnerable Kiloview P1/P2 devices to a version newer than 4.8.2605. This is the primary mitigation step.
    1. Patching: Upgrade the firmware on all Kiloview P1/P2 devices to version 4.8.2605 or later. Check the Kiloview website for the latest firmware updates: [https://www.kiloview.com/](https://www.kiloview.com/)
    2. Network Segmentation: Segment the network to limit the impact of a potential compromise. Isolate the Kiloview devices from critical systems.
    3. Monitoring: Monitor network traffic for suspicious activity originating from the Kiloview devices. Look for unusual outbound connections or unexpected process executions.
    4. Web Application Firewall (WAF): If feasible, deploy a WAF in front of the Kiloview devices to filter malicious requests and potentially block command injection attempts.
    5. Regular Updates: Establish a process for regularly updating the firmware on all Kiloview devices to ensure timely application of security patches.
    6. Review Logs: Regularly review device logs for anomalies that might indicate exploitation attempts.

    4. Executive Summary
    Kiloview P1/P2 video encoders are affected by a critical remote code execution vulnerability (CVE-2023-41917). This vulnerability allows attackers to execute arbitrary code on the devices, potentially leading to full system compromise, loss of video streams, data breaches, and disruption of services. The vulnerability is easily exploitable over the network and requires no user interaction. We recommend immediately patching all vulnerable devices to firmware version 4.8.2605 or later. This is a high priority issue with a potentially significant business impact, and prompt action is essential to protect our video infrastructure and data. Failure to address this vulnerability could result in significant downtime and potential data loss. Consider network segmentation and increased monitoring as additional layers of protection.

    CVE-2023-41918

    Severity: CRITICAL

    Description: A vulnerability allows unauthorized access to functionality inadequately constrained by ACLs. Attackers may exploit this to unauthenticated execute commands potentially leading to unauthorized data manipulation, access to privileged functions, or even the execution of arbitrary code.

    CVSS Score: 10

    Priority

    B

    CISA Data

    EPSS Data

    • EPSS: 0.002820000
    • Percentile: 0.516560000
    • Date: 2026-04-19

    ExploitDB

    No data available.

    HackerOne Data

    • Rank: 9119
    • Reports submitted count: 0
    • Unknown: 0
    • None: 0
    • Low: 0
    • Medium: 0
    • High: 0
    • Critical: 0

    GitHub PoCs

      Nuclei Templates

      No data available.

      VulnCheck Data

      Affected Products:

      • Kiloview P1/P2 - Versions: All

      References:

      Risk Assessment

      1. Risk Assessment
      The vulnerability, CVE-2023-41918, is a critical issue affecting Kiloview P1/P2 video encoders. It stems from missing authentication for critical functionality inadequately constrained by Access Control Lists (ACLs). This means an attacker can potentially execute commands without authentication, granting them significant control over the device. The CVSS score of 10 indicates a high level of severity. The likelihood of exploitation is considered high, as the vulnerability is network-accessible and requires minimal complexity to exploit. The EPSS score of 0.002820000 suggests a relatively low, but still present, probability of exploitation in the wild. The potential impact is significant, affecting confidentiality (sensitive data could be exposed), integrity (data and system configurations could be altered), and availability (the device could become unusable or experience disruption). Business impact could range from loss of video feeds, to unauthorized access to the network the device sits on, to potentially ransomware infection if the device is a jumping-off point.

      2. Potential Attack Scenarios
      An attacker on the same network as a vulnerable Kiloview P1/P2 device can directly exploit this vulnerability. The attack vector is network-based, requiring no user interaction. The attacker identifies a vulnerable device and sends a specifically crafted command to the device, bypassing authentication checks. This could be accomplished by sending a request to a specific API endpoint, or leveraging a common network protocol. Upon successful exploitation, the attacker gains the ability to execute commands on the device. Potential outcomes include: stealing video streams, altering device configuration, utilizing the device as a pivot point to access other network resources, or even installing malicious software. For example, an attacker could modify the video stream to insert propaganda, or redirect the stream to their own server for surveillance.

      3. Mitigation Recommendations
      The primary mitigation is to upgrade the Kiloview P1/P2 firmware to a version newer than 4.8.2605. Kiloview should be contacted for the latest firmware version. Implement network segmentation to limit the blast radius of a potential compromise, isolating the video encoders from critical network segments. Monitor network traffic for unusual activity originating from the Kiloview devices, looking for unexpected outbound connections or command executions. Consider implementing a Web Application Firewall (WAF) in front of the devices if feasible, to filter malicious requests. Review ACLs for other network resources to ensure they are appropriately restrictive, minimizing the impact if the Kiloview device is compromised. Refer to the NCSC advisory for more detailed information: https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273.

      4. Executive Summary
      Kiloview P1/P2 video encoders are vulnerable to a critical security flaw that allows attackers to gain unauthorized control of the devices without authentication. This could lead to disruptions in video feeds, data breaches, or even wider network compromise. The vulnerability is easily exploitable and has a high potential impact on confidentiality, integrity, and availability. Immediate action is required to mitigate this risk. The most effective solution is to upgrade the firmware to a version newer than 4.8.2605. Prioritize patching these devices, especially those with external network access, to prevent potential disruptions and protect sensitive data. This vulnerability represents a significant risk to business operations relying on these video encoders and requires prompt attention.

      CVE-2023-41919

      Severity: CRITICAL

      Description: Hardcoded credentials are discovered within the application's source code, creating a potential security risk for unauthorized access.

      CVSS Score: 9.8

      Priority

      B

      CISA Data

      EPSS Data

      • EPSS: 0.001410000
      • Percentile: 0.343420000
      • Date: 2026-04-19

      ExploitDB

      No data available.

      HackerOne Data

      • Rank: 9119
      • Reports submitted count: 0
      • Unknown: 0
      • None: 0
      • Low: 0
      • Medium: 0
      • High: 0
      • Critical: 0

      GitHub PoCs

        Nuclei Templates

        No data available.

        VulnCheck Data

        Affected Products:

        • Kiloview P1/P2 - Versions: All

        References:

        Risk Assessment

        1. Risk Assessment
        The vulnerability, identified as CVE-2023-41919, involves hardcoded credentials within the Kiloview P1/P2 video encoder devices. This represents a critical risk as it allows for potentially unauthorized access to the devices and the data they process. The nature of hardcoded credentials implies a relatively low barrier to exploitation – an attacker doesn't need sophisticated techniques to discover and leverage these credentials. The CVSS score of 9.8 (Critical) and the vector (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) indicate that the vulnerability is network accessible, easily exploitable, requires no privileges or user interaction, has an unchanged scope, and results in high impact to confidentiality, integrity, and availability. The business impact could range from unauthorized video streams being accessed to full control of the encoder, potentially disrupting video feeds, altering configurations, or even gaining access to the network the device is connected to. The EPSS score of 0.001410000 suggests a relatively low but non-negligible probability of exploitation in the wild.

        2. Potential Attack Scenarios
        An attacker could remotely access the Kiloview P1/P2 device using the hardcoded credentials. The attack vector is network-based, meaning the attacker can exploit the vulnerability from anywhere with network connectivity to the device. The attacker first discovers the hardcoded credentials, potentially through reverse engineering the firmware or by leveraging previously published findings (as indicated by the PacketStorm URL). They then use these credentials to log into the device's web interface or through an API call. Once authenticated, the attacker can modify the device’s configuration, intercept video streams, or even use the device as a pivot point to gain access to other systems on the same network. The potential outcome is complete compromise of the video encoder, potentially leading to loss of video feed, altered video content, or network intrusion.

        3. Mitigation Recommendations
        Immediate action should be taken to patch or upgrade the Kiloview P1/P2 devices to a version newer than 4.8.2605. Kiloview should be contacted directly for the latest firmware updates. If immediate patching is not possible, consider implementing network segmentation to limit the impact of a potential compromise. Restrict network access to these devices to only those networks and systems that require it. Implement strong password policies for any other accounts on the device, supplementing the mitigation of the hardcoded credentials. Regularly monitor the devices for unusual activity, such as unexpected outbound connections or changes to configuration settings. Review the advisory at https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 for further details and potential workarounds.

        4. Executive Summary
        Kiloview P1/P2 video encoder devices are vulnerable to a critical security flaw (CVE-2023-41919) due to hardcoded credentials. This means an attacker could potentially gain full control of the device without needing to guess a password, leading to disruption of video feeds, compromised video content, or even network intrusion. The impact is high, affecting the confidentiality, integrity, and availability of our video streaming infrastructure. We recommend immediate patching of all Kiloview P1/P2 devices to the latest firmware version (greater than 4.8.2605). If patching isn’t immediate, network segmentation should be implemented to limit the potential damage. Addressing this vulnerability is crucial to maintaining the reliability and security of our video services and preventing potential disruptions to business operations.

        CVE-2023-41920

        Severity: CRITICAL

        Description: The vulnerability allows attackers access to the root account without having to authenticate. Specifically, if the device is configured with the IP address of 10.10.10.10, the root user is automatically logged in.

        CVSS Score: 9.8

        Priority

        B

        CISA Data

        EPSS Data

        • EPSS: 0.001410000
        • Percentile: 0.343420000
        • Date: 2026-04-19

        ExploitDB

        No data available.

        HackerOne Data

        • Rank: 9119
        • Reports submitted count: 0
        • Unknown: 0
        • None: 0
        • Low: 0
        • Medium: 0
        • High: 0
        • Critical: 0

        GitHub PoCs

          Nuclei Templates

          No data available.

          VulnCheck Data

          Affected Products:

          • Kiloview P1/P2 - Versions: All

          References:

          Risk Assessment

          1. Risk Assessment
          The vulnerability CVE-2023-41920 represents a critical risk to Kiloview P1/P2 devices, achieving a CVSS score of 9.8. The vulnerability allows for authentication bypass, granting attackers root access without needing valid credentials. The nature of the vulnerability is straightforward: any device configured with the IP address 10.10.10.10 automatically logs in the root user. The likelihood of exploitation is high, as the condition is easily met through network configuration. Ease of exploitation is also high – no complex steps are required. The potential impact on confidentiality is high, as attackers can access sensitive data stored on the device. Integrity is also highly impacted, as attackers can modify device configuration and data. Availability is similarly impacted, as attackers could potentially disrupt device operation or even render it unusable. The EPSS score of 0.001410000 indicates a relatively low, but still present, probability of exploitation in the wild. This vulnerability poses a significant risk to organizations utilizing Kiloview P1/P2 devices, particularly those relying on them for critical video encoding and transmission.

          2. Potential Attack Scenarios
          A potential attack scenario involves a malicious actor targeting a Kiloview P1/P2 device on a network. The attacker scans the network for devices and identifies a Kiloview P1/P2 encoder. They then configure the encoder with the IP address 10.10.10.10, either directly through the device’s interface or by manipulating network settings. Upon configuration, the attacker is automatically logged in as the root user. From there, the attacker can access all device resources, including video streams, configuration settings, and potentially other connected systems depending on the device’s network configuration. The attacker could steal sensitive video feeds, alter encoding settings to degrade video quality, or use the device as a pivot point to access other systems on the network. This scenario is particularly potent in environments where the Kiloview device is responsible for transmitting critical video data, such as security camera feeds or live broadcast streams.

          3. Mitigation Recommendations
          The primary mitigation for CVE-2023-41920 is to update Kiloview P1/P2 devices to firmware version 4.8.2605 or higher. Kiloview has released updates to address the authentication bypass vulnerability. As an immediate action, organizations should verify the IP address configuration of their Kiloview P1/P2 devices and avoid using 10.10.10.10 if possible. If 10.10.10.10 must be used, implement network segmentation to limit the impact of a potential breach. Consider implementing strong password policies for other user accounts on the device, even though root access can be bypassed. Monitor network traffic for suspicious activity originating from the Kiloview devices. Further information and advisories can be found at https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 and https://packetstormsecurity.com/search/?q=CVE-2023-41920.

          4. Executive Summary
          Kiloview P1/P2 video encoders are vulnerable to a critical authentication bypass (CVE-2023-41920) that allows attackers to gain root access without a password if the device is assigned the IP address 10.10.10.10. This poses a significant risk to the confidentiality, integrity, and availability of video streams and device configuration. Attackers can steal video feeds, alter encoding settings, and potentially use the device as a stepping stone to compromise other network systems. We recommend upgrading all Kiloview P1/P2 devices to firmware version 4.8.2605 or higher as soon as possible. Avoiding the IP address 10.10.10.10, if feasible, will also help mitigate the risk. Addressing this vulnerability is crucial to protect critical video data and maintain the reliable operation of Kiloview devices. The potential business impact of this vulnerability ranges from data theft and service disruption to compromised security camera feeds. Prompt action is required to minimize the risk.

          CVE-2023-41921

          Severity: CRITICAL

          Description: A vulnerability allows attackers to download source code or an executable from a remote location and execute the code without sufficiently verifying the origin and integrity of the code. This vulnerability can allow attackers to modify the firmware before uploading it to the system, thus achieving the modification of the target’s integrity to achieve an insecure state.

          CVSS Score: 9.8

          Priority

          B

          CISA Data

          EPSS Data

          • EPSS: 0.001300000
          • Percentile: 0.324680000
          • Date: 2026-04-19

          ExploitDB

          No data available.

          HackerOne Data

          • Rank: 9116
          • Reports submitted count: 0
          • Unknown: 0
          • None: 0
          • Low: 0
          • Medium: 0
          • High: 0
          • Critical: 0

          GitHub PoCs

            Nuclei Templates

            No data available.

            VulnCheck Data

            Affected Products:

            • Kiloview P1/P2 - Versions: All

            References:

            Risk Assessment

            1. Risk Assessment
            The vulnerability CVE-2023-41921, affecting Kiloview P1/P2 devices, presents a critical risk due to the ability of attackers to download and execute code without proper integrity checks. The nature of the vulnerability lies in the lack of sufficient verification of the origin and integrity of downloaded code, allowing for potential firmware modification. The business impact could be significant, particularly for organizations relying on the Kiloview P1/P2 devices for critical video encoding and streaming applications. The likelihood of exploitation is considered high given the network accessibility and low attack complexity. The vulnerability impacts confidentiality, integrity, and availability; an attacker could potentially steal data, modify the device's function, or even render it unusable. The CVSS score of 9.8 (CRITICAL) and EPSS score of 0.001300000 further support this assessment, indicating a high probability of exploitation and substantial impact.

            2. Potential Attack Scenarios
            An attacker could leverage this vulnerability to compromise a Kiloview P1/P2 device through a man-in-the-middle attack. The attack vector is the network connection to the device. The attacker intercepts the firmware update process, replacing the legitimate firmware with a malicious version. This malicious firmware could contain a backdoor allowing for remote access and control of the device, or could modify the video stream to include subtle visual alterations, useful for espionage. The attack process involves: 1) Identifying a target Kiloview P1/P2 device. 2) Intercepting network traffic during a firmware update. 3) Substituting a crafted malicious firmware image. 4) The device downloads and executes the malicious firmware, granting the attacker control. The potential outcome is complete compromise of the device, allowing the attacker to monitor the video stream, modify it, or use the device as a pivot point to attack other systems on the network.

            3. Mitigation Recommendations
            The primary mitigation recommendation is to upgrade the firmware on Kiloview P1/P2 devices to a version newer than 4.8.2605. Kiloview should be contacted for the latest firmware version. In the interim, consider network segmentation to limit the blast radius should a device be compromised. Implement network monitoring to detect anomalous traffic patterns that may indicate a firmware update compromise. Additionally, ensure devices are not directly exposed to the internet if possible, using a VPN or firewall for access. Verify the integrity of downloaded firmware updates using checksums if available. Further information can be found in the NCSC-NL advisory: https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273. Consider reviewing PacketStorm for potential exploits: https://packetstormsecurity.com/search/?q=CVE-2023-41921.

            4. Executive Summary
            Kiloview P1/P2 video encoding devices are vulnerable to a critical security flaw (CVE-2023-41921) that allows attackers to compromise the devices by downloading and executing code without proper verification. This could lead to data theft, modification of the video stream, or complete device control. The risk is high, with a CVSS score of 9.8, and impacts confidentiality, integrity and availability. Immediate action is required to mitigate this vulnerability. We recommend upgrading the firmware to a version newer than 4.8.2605 as soon as possible. Failure to address this vulnerability could result in significant business disruption and potential compromise of sensitive video data. Proactive patching and network segmentation are vital to protecting our video encoding infrastructure.

            CVE-2023-41922

            Severity: HIGH

            Description: A 'Cross-site Scripting' (XSS) vulnerability, characterized by improper input neutralization during web page generation, has been discovered. This vulnerability allows for Stored XSS attacks to occur. Multiple areas within the administration interface of the webserver lack adequate input validation, resulting in multiple instances of Stored XSS vulnerabilities.

            CVSS Score: 7.2

            Priority

            B

            CISA Data

            EPSS Data

            • EPSS: 0.001490000
            • Percentile: 0.354300000
            • Date: 2026-04-19

            ExploitDB

            No data available.

            HackerOne Data

            • Rank: 9116
            • Reports submitted count: 0
            • Unknown: 0
            • None: 0
            • Low: 0
            • Medium: 0
            • High: 0
            • Critical: 0

            GitHub PoCs

              Nuclei Templates

              No data available.

              VulnCheck Data

              Affected Products:

              • Kiloview P1/P2 - Versions: All

              References:

              Risk Assessment

              1. Risk Assessment
              The vulnerability, CVE-2023-41922, is a Stored Cross-Site Scripting (XSS) flaw within the administration interface of Kiloview P1/P2 devices. This means an attacker can inject malicious scripts that will be executed in the context of other users' browsers when they access the affected administration interface. The CVSS score of 7.2 (HIGH) indicates a significant risk. The vulnerability has a Network attack vector, Low attack complexity, and requires No Privileges, meaning it can be exploited remotely with relative ease. The scope is Changed, indicating that the attacker can potentially impact resources beyond their own session. Confidentiality and Integrity are both Low impacted – an attacker could steal cookies or modify administrative settings. Availability is currently considered Not impacted, but a malicious script could potentially lead to a denial-of-service. The EPSS score of 0.001490000 suggests a relatively low, but not insignificant, probability of exploitation. The business impact could range from minor defacement of the administration interface to compromised administrator accounts, potentially leading to wider network access if the Kiloview devices have access to sensitive data or control critical systems.

              2. Potential Attack Scenarios
              An attacker could leverage this Stored XSS vulnerability by crafting a malicious script and injecting it into an administrative input field. For example, an attacker could insert a malicious script into the "Device Name" field within the administration interface. When another administrator accesses the device's administration page, the injected script will execute in their browser. This script could steal the administrator’s session cookie, granting the attacker full administrative access to the Kiloview device. From there, the attacker could change configuration settings, redirect video streams, or potentially gain a foothold into the wider network depending on the device's network connectivity and permissions. The attack vector is network-based, requiring only access to the Kiloview device's administration interface (typically via a web browser). The attack process involves identifying vulnerable input fields, crafting a malicious script, injecting the script, and then observing the execution when another administrator logs in.

              3. Mitigation Recommendations
              The primary mitigation is to upgrade the Kiloview P1/P2 firmware to a version later than 4.8.2605. This should address the improper input validation causing the XSS vulnerability. Immediate patching is recommended to minimize the window of opportunity for attackers. Secondary mitigation steps include implementing a Web Application Firewall (WAF) in front of the Kiloview device to filter out malicious scripts. Regularly review administrative input fields to identify potential injection points. Implement strong password policies and multi-factor authentication for all administrative accounts to limit the impact of a compromised account. Consider limiting network access to the Kiloview devices to only necessary systems. Further information can be found in the advisory at https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273 and potentially through searching PacketStorm: https://packetstormsecurity.com/search/?q=CVE-2023-41922.

              4. Executive Summary
              Kiloview P1/P2 devices are vulnerable to a Cross-Site Scripting (XSS) attack, allowing an attacker to inject malicious code into the device’s administration interface. This can lead to compromised administrator accounts and potentially broader network access depending on the device’s configuration. The vulnerability is considered HIGH risk with a relatively easy attack vector. Promptly upgrading the Kiloview firmware to version 4.8.2605 or higher is crucial to mitigate this risk. Failing to address this vulnerability could result in unauthorized access to the device, modification of settings, or potential disruption of video streams, impacting business operations that rely on these devices. Prioritizing this patch is recommended to ensure the security and reliability of your Kiloview P1/P2 deployments.

              CVE-2023-41923

              Severity: HIGH

              Description: The user management section of the web application permits the creation of user accounts with excessively weak passwords, including single-character passwords.

              CVSS Score: 7.2

              Priority

              B

              CISA Data

              EPSS Data

              • EPSS: 0.001230000
              • Percentile: 0.313910000
              • Date: 2026-04-19

              ExploitDB

              No data available.

              HackerOne Data

              • Rank: 9116
              • Reports submitted count: 0
              • Unknown: 0
              • None: 0
              • Low: 0
              • Medium: 0
              • High: 0
              • Critical: 0

              GitHub PoCs

                Nuclei Templates

                No data available.

                VulnCheck Data

                Affected Products:

                • Kiloview P1/P2 - Versions: All

                References:

                Risk Assessment

                1. Risk Assessment
                The vulnerability, CVE-2023-41923, concerns weak password requirements within the user management section of Kiloview P1/P2 devices. The ability to create single-character passwords represents a significant weakness, allowing for relatively easy compromise of user accounts. This vulnerability is rated HIGH with a CVSS score of 7.2, indicating a substantial risk. The business impact could range from unauthorized access to device configurations and potentially streamed video feeds, to broader network compromise depending on network segmentation and user privileges. The likelihood of exploitation is high due to the ease with which weak passwords can be brute-forced or guessed. The vulnerability impacts confidentiality (potential exposure of video streams or configurations) and integrity (potential for attackers to modify device settings). Availability is less directly impacted, but a compromised account could lead to disruption of service through configuration changes. The EPSS score of 0.001230000 suggests a moderate exploitation probability in the wild.

                2. Potential Attack Scenarios
                An attacker could leverage this vulnerability to gain access to a Kiloview P1/P2 device’s web interface using a simple brute-force attack. The attacker, knowing the device is on the network, attempts to login with various single-character passwords (e.g., 'a', '1', '!', '$'). Given the lack of robust password complexity requirements, the attacker will likely succeed in gaining access with one of these simple passwords. Once logged in, the attacker can modify the device configuration, potentially redirecting the video stream to a malicious server, changing network settings to sniff traffic, or even using the device as a foothold for lateral movement within the network if the device has access to other systems. This is especially concerning for devices used in broadcasting or security applications where the video stream’s integrity and confidentiality are critical.

                3. Mitigation Recommendations
                The primary mitigation is to update the Kiloview P1/P2 firmware to a version greater than 4.8.2605. This should enforce stronger password complexity requirements. In the interim, administrators should enforce strong passwords across all user accounts on the Kiloview devices. This includes a minimum length, and a mix of upper and lowercase letters, numbers, and symbols. Multi-Factor Authentication (MFA), if supported by the devices, should be enabled for all user accounts. Regularly audit user accounts and passwords, removing inactive accounts or those with weak passwords. Consider network segmentation to limit the impact of a compromised device. Review network logs for suspicious login attempts. Further details are available in the NCSC-NL advisory: https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273

                4. Executive Summary
                Kiloview P1/P2 devices are vulnerable to a HIGH severity weakness allowing the creation of excessively weak passwords, including single-character passwords. This makes the devices susceptible to relatively easy compromise, potentially leading to unauthorized access to video streams and device configurations. This could disrupt operations, expose sensitive data, or allow attackers to use the devices as a launching point for further network attacks. We recommend immediately updating the firmware to version 4.8.2605 or later, and enforcing strong password policies for all user accounts. Addressing this vulnerability is critical to maintain the confidentiality, integrity, and availability of video feeds and the security of the broader network. Prompt action will minimize the risk of exploitation and potential business impact.

                CVE-2023-41926

                Severity: HIGH

                Description: The webserver utilizes basic authentication for its user login to the configuration interface. As encryption is disabled on port 80, it enables potential eavesdropping on user traffic, making it possible to intercept their credentials.

                CVSS Score: 8.8

                Priority

                B

                CISA Data

                EPSS Data

                • EPSS: 0.001300000
                • Percentile: 0.324370000
                • Date: 2026-04-19

                ExploitDB

                No data available.

                HackerOne Data

                • Rank: 9119
                • Reports submitted count: 0
                • Unknown: 0
                • None: 0
                • Low: 0
                • Medium: 0
                • High: 0
                • Critical: 0

                GitHub PoCs

                  Nuclei Templates

                  No data available.

                  VulnCheck Data

                  Affected Products:

                  • Kiloview P1/P2 - Versions: All

                  References:

                  Risk Assessment

                  1. Risk Assessment
                  The vulnerability, identified as CVE-2023-41926, centers around the use of basic authentication over unencrypted HTTP (port 80) for the Kiloview P1/P2 devices’ web configuration interface. This allows for potential eavesdropping on user credentials during login. The nature of the vulnerability is the exposure of sensitive login credentials in transit. The business impact can range from unauthorized access to the device configuration, potentially leading to altered settings or denial of service, to full compromise of the video stream and associated data. The likelihood of exploitation is moderate to high, as network sniffing is a relatively simple attack to execute, particularly on networks where the Kiloview device resides. The ease of exploitation is also moderate, requiring only a network sniffer and a user actively logging into the web interface. The impact on confidentiality is high, as usernames and passwords can be readily intercepted. Integrity is also high, as an attacker gaining access can modify device configurations. Availability could be impacted if an attacker modifies settings causing the device to malfunction or become unreachable. The EPSS score of 0.0013 indicates a relatively low, but not insignificant, probability of exploitation in the wild.

                  2. Potential Attack Scenarios
                  An attacker positioned on the same network as the Kiloview P1/P2 device can perform a man-in-the-middle (MITM) attack to intercept credentials. The attack scenario unfolds as follows:
                  The attacker uses a network sniffing tool, such as Wireshark, to capture traffic on the network segment where the Kiloview device is located.
                  A user attempts to log into the Kiloview device's web configuration interface using basic authentication (username and password).
                  The credentials are transmitted in plaintext over HTTP, allowing the attacker to easily capture them using the network sniffer.
                  Once the attacker has the credentials, they can log into the device's web interface and modify settings, potentially altering the video stream, changing network configurations, or even causing a denial of service.
                  A more sophisticated attacker could use the captured credentials to access other systems if the Kiloview device uses the same username/password combination elsewhere on the network.

                  3. Mitigation Recommendations
                  The primary mitigation for this vulnerability is to upgrade the Kiloview P1/P2 firmware to a version 4.8.2605 or higher. This update should implement encryption for the web interface, ideally using HTTPS.
                  Immediate Action: Upgrade firmware to version 4.8.2605 or higher.
                  Short-Term Mitigation: If an immediate upgrade isn't possible, limit network access to the Kiloview device to trusted networks and users. Consider segmenting the network to isolate the device.
                  Long-Term Mitigation: Implement a strong password policy for Kiloview devices, and consider using a password manager to ensure unique and complex passwords are used. Enable HTTPS where available on other devices.
                  Relevant Resources:
                  NCSC-NL Advisory: https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273
                  PacketStorm Security: https://packetstormsecurity.com/search/?q=CVE-2023-41926

                  4. Executive Summary
                  Kiloview P1/P2 video encoder devices are vulnerable to credential theft due to the use of unencrypted basic authentication for their web configuration interface. This allows attackers on the same network to easily intercept usernames and passwords, potentially gaining full control of the device and impacting the video stream. The vulnerability is rated as HIGH severity (CVSS score of 8.8) and requires prompt attention. Upgrading the device firmware to version 4.8.2605 or higher is the primary mitigation. Failing to address this vulnerability could lead to unauthorized access, altered configurations, and potentially a disruption of video services. It is crucial to upgrade the firmware as soon as possible to protect your Kiloview devices and the data they transmit. This vulnerability represents a moderate risk to business operations, especially if the video stream is critical for monitoring or broadcasting.

                  CVE-2023-41927

                  Severity: MEDIUM

                  Description: The server supports at least one cipher suite which is on the NCSC-NL list of cipher suites to be phased out, increasing the risk of cryptographic weaknesses.

                  CVSS Score: 5.3

                  Priority

                  D

                  CISA Data

                  EPSS Data

                  • EPSS: 0.000400000
                  • Percentile: 0.121710000
                  • Date: 2026-04-19

                  ExploitDB

                  No data available.

                  HackerOne Data

                  • Rank: 9119
                  • Reports submitted count: 0
                  • Unknown: 0
                  • None: 0
                  • Low: 0
                  • Medium: 0
                  • High: 0
                  • Critical: 0

                  GitHub PoCs

                    Nuclei Templates

                    No data available.

                    VulnCheck Data

                    Affected Products:

                    • Kiloview P1/P2 - Versions: All

                    References:

                    Risk Assessment

                    1. Risk Assessment
                    The vulnerability, CVE-2023-41927, stems from Kiloview P1/P2 devices supporting TLS cipher suites deemed weak by the NCSC-NL (Netherlands National Cyber Security Centre) and slated for phasing out. This indicates an inadequate encryption strength (CWE-327) which could lead to cryptanalysis (CAPEC-97). The risk is medium, with a CVSS score of 5.3. The vulnerability impacts confidentiality primarily, as attackers could potentially decrypt network traffic. While integrity and availability aren’t directly impacted, a compromised confidentiality could lead to cascading effects. The attack vector is adjacent network, requiring the attacker to be on the same network as the Kiloview device, but the complexity is high, suggesting some effort is required to successfully exploit. The likelihood of exploitation is moderate, as many organizations utilize TLS and may not have prioritized updating cipher suite preferences on these devices. Business impact could include exposure of sensitive video streams, control data, or management credentials, potentially leading to data breaches, operational disruption, or loss of competitive advantage.

                    2. Potential Attack Scenarios
                    An attacker on the same network as a vulnerable Kiloview P1/P2 device could intercept TLS traffic using a man-in-the-middle (MITM) attack. The attacker, utilizing a tool like Wireshark or a dedicated TLS interception proxy, would capture the encrypted traffic between the Kiloview device and a client (e.g., a video management system, a web browser accessing the device's interface). Due to the use of a weaker cipher suite, the attacker could more easily decrypt the captured traffic, potentially revealing sensitive information such as video stream content, administrative credentials, or configuration data. This decrypted data could then be used for further reconnaissance, to gain unauthorized access to the video stream, or to compromise the Kiloview device itself. The attacker could leverage this access to disrupt video feeds, manipulate settings, or even gain a foothold within the broader network.

                    3. Mitigation Recommendations
                    The primary mitigation is to update the Kiloview P1/P2 devices to a firmware version greater than 4.8.2605. This update should include support for stronger, more modern TLS cipher suites, as recommended by the NCSC-NL. In the interim, if patching is not immediately possible, consider network segmentation to isolate the Kiloview devices from more critical network segments. Monitor network traffic for unusual patterns that may indicate an attack in progress. Regularly review the Kiloview device’s configuration to ensure the strongest possible cipher suites are enabled. Refer to the NCSC-NL advisory for a full list of cipher suites to avoid: https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273. Additional resources on TLS cipher suites can be found on the Mozilla SSL Configuration Generator website: https://ssl-config-generator.mozilla.org/.

                    4. Executive Summary
                    Kiloview P1/P2 devices are vulnerable to a medium-severity cryptographic weakness due to the support of outdated TLS cipher suites. This vulnerability allows attackers on the same network to potentially decrypt sensitive data transmitted by the devices, including video streams and administrative credentials. While not immediately catastrophic, this vulnerability poses a risk to the confidentiality of your video data and could lead to broader security compromises. Updating the device firmware to version 4.8.2605 or higher is the most effective mitigation. Prompt action is recommended to minimize the risk of data breaches and ensure the ongoing security of your video infrastructure. The NCSC-NL advisory provides further detail and should be consulted for a complete understanding of the vulnerability and its implications.

                    CVE-2023-41928

                    Severity: MEDIUM

                    Description: The device is observed to accept deprecated TLS protocols, increasing the risk of cryptographic weaknesses.

                    CVSS Score: 5.3

                    Priority

                    D

                    CISA Data

                    EPSS Data

                    • EPSS: 0.000400000
                    • Percentile: 0.121710000
                    • Date: 2026-04-19

                    ExploitDB

                    No data available.

                    HackerOne Data

                    • Rank: 9119
                    • Reports submitted count: 0
                    • Unknown: 0
                    • None: 0
                    • Low: 0
                    • Medium: 0
                    • High: 0
                    • Critical: 0

                    GitHub PoCs

                      Nuclei Templates

                      No data available.

                      VulnCheck Data

                      Affected Products:

                      • Kiloview P1/P2 - Versions: All

                      References:

                      Risk Assessment

                      1. Risk Assessment
                      The vulnerability, CVE-2023-41928, concerns the Kiloview P1/P2 devices accepting deprecated TLS protocols. This indicates a weakness in the cryptographic implementation of these devices, potentially allowing attackers to intercept and decrypt network traffic. The CVSS score of 5.3 (Medium) suggests a moderate level of risk. The attack vector is Adjacent Network, meaning the attacker needs network access to the device, but not necessarily direct internet exposure. The attack complexity is High, meaning successful exploitation isn't trivial and may require some effort. Confidentiality is the primary impact, as an attacker could potentially read sensitive data transmitted to or from the device. Integrity and Availability are currently considered to have a low impact, but could be affected if the deprecated protocols are used in a way that allows for manipulation of the traffic. The business impact is dependent on the sensitivity of the data flowing through these devices. If the Kiloview devices are used for streaming video of sensitive operations, or for remote control of critical infrastructure, the impact could be significant. The EPSS score of 0.000400000 indicates a relatively low probability of exploitation, but the potential confidentiality impact warrants attention.

                      2. Potential Attack Scenarios
                      A potential attack scenario involves a man-in-the-middle (MITM) attack. An attacker positioned on the same network as the Kiloview P1/P2 device could use tools like Wireshark or a dedicated TLS downgrade attack tool (e.g., testssl.sh) to force the device to negotiate a connection using a weaker, deprecated TLS protocol such as TLS 1.0 or 1.1. Once the connection is established using the weaker protocol, the attacker can intercept the encrypted traffic, decrypt it, and potentially view sensitive data being transmitted. This data could include video streams, control signals, or authentication credentials. The attacker could then passively monitor the traffic, or even actively modify it depending on the specific use case of the Kiloview device. For example, if the device is used for streaming a live event, the attacker could intercept the video stream and view the event before it reaches the intended audience. Packetstormsecurity.com has some examples of tools that could be leveraged for this attack: https://packetstormsecurity.com/search/?q=CVE-2023-41928.

                      3. Mitigation Recommendations
                      The primary mitigation recommendation is to upgrade the firmware of the Kiloview P1/P2 devices to a version newer than 4.8.2605. This should ensure that the devices prioritize stronger TLS protocols and limit the use of deprecated ones. Organizations should verify the firmware upgrade was successful and that the devices are no longer accepting deprecated TLS protocols, using tools like testssl.sh. In the interim, if upgrading immediately is difficult, network segmentation can limit the attack surface. Placing the Kiloview devices on a separate VLAN with restricted access to other network resources can reduce the impact of a successful attack. Consider enforcing TLS 1.2 or higher at the network level, if feasible. Monitor network traffic for connections using deprecated TLS protocols. Further information and advisories can be found at: https://advisories.ncsc.nl/advisory?id=NCSC-2024-0273.

                      4. Executive Summary
                      Kiloview P1/P2 devices are vulnerable to a cryptographic weakness due to their acceptance of deprecated TLS protocols (CVE-2023-41928). This means an attacker on the same network could potentially intercept and decrypt sensitive data being transmitted to or from the device. While the risk is assessed as medium, the potential for data compromise is real, especially if these devices are used for streaming or controlling critical processes. The most important action is to upgrade the device firmware to version 4.8.2605 or higher. This will strengthen the cryptographic implementation and reduce the risk of a successful attack. Prompt action is recommended to protect sensitive data and ensure the continued reliable operation of these devices. This vulnerability impacts confidentiality and should be addressed in a timely manner.