Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 06 Jan 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 06 Jan 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera streams without authorization. | |
| Title | Arteco Web Client DVR/NVR Session ID Brute Force Authentication Bypass | |
| Weaknesses | CWE-331 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-01-06T16:51:48.908Z
Reserved: 2026-01-03T14:10:13.302Z
Link: CVE-2020-36925
Updated: 2026-01-06T16:51:33.500Z
Status : Deferred
Published: 2026-01-06T16:15:50.683
Modified: 2026-04-15T00:35:42.020
Link: CVE-2020-36925
No data.
OpenCVE Enrichment
No data.