CVE-2020-36925
Published: 06 January 2026
Summary
CVE-2020-36925 is a critical-severity Insufficient Entropy (CWE-331) vulnerability in Ibmcloud (inferred from references). Its CVSS base score is 9.8 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked in the top 30.1% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 AC-17 (Remote Access) and IA-5 (Authenticator Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
IA-5 requires authenticators, including session IDs, to have sufficient strength of mechanism and complexity to resist brute-force guessing attacks.
SC-23 mandates mechanisms to protect the authenticity of communications sessions, directly countering session hijacking via weak session IDs.
AC-17 requires protections for remote access sessions against hijacking, applicable to the web client allowing unauthorized remote access to camera streams.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The vulnerability enables remote unauthenticated attackers to brute-force weak session IDs in a public-facing web application (Arteco Web Client DVR/NVR), hijacking sessions to bypass authentication and access live camera streams, directly facilitating T1190: Exploit Public-Facing Application.
NVD Description
Arteco Web Client DVR/NVR contains a session hijacking vulnerability with insufficient session ID complexity that allows remote attackers to bypass authentication. Attackers can brute force session IDs within a specific numeric range to obtain valid sessions and access live camera…
more
streams without authorization.
Deeper analysisAI
CVE-2020-36925 is a session hijacking vulnerability in the Arteco Web Client DVR/NVR software, stemming from insufficient session ID complexity (CWE-331). The flaw enables remote attackers to brute force session IDs within a specific numeric range, bypassing authentication mechanisms entirely. Rated at CVSS 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), it poses a critical risk due to its high confidentiality, integrity, and availability impacts.
Any remote attacker can exploit this vulnerability without prerequisites like user interaction or privileges, simply by guessing valid session IDs through brute force. Successful exploitation grants unauthorized access to live camera streams, allowing attackers to view sensitive video feeds from the DVR/NVR system.
Advisories and references, including those from CXSecurity (WLB-2020120170), IBM XForce Exchange (vulnerabilities 193750 and 194139), PacketStorm (ID 160718), and the vendor site at arteco-global.com, provide further details on the issue, though specific mitigation or patch information is not detailed in the core CVE description.
Details
- CWE(s)