Cyber Posture

CVE-2026-28747

High

Published: 27 April 2026

Published
27 April 2026
Modified
28 April 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0002 3.6th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-28747 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Cisa (inferred from references). Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 3.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation of Remote Services (T1210) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely flaw remediation, directly addressing the weak key generation vulnerability through application of vendor-provided firmware patches.

prevent

Mandates secure cryptographic key establishment and management, preventing weak key generation flaws in firmware authentication processes.

prevent

Ensures authenticators including cryptographic keys possess sufficient strength of mechanism to mitigate authorization bypass via weak keys.

MITRE ATT&CK Enterprise TechniquesAI

T1210 Exploitation of Remote Services Lateral Movement
Adversaries may exploit remote services to gain unauthorized access to internal systems once inside of a network.
T1606 Forge Web Credentials Credential Access
Adversaries may forge credential materials that can be used to gain access to web applications or Internet services.
Why these techniques?

Weak cryptographic key generation directly enables authorization bypass on camera remote interfaces (T1210 Exploitation of Remote Services) and allows prediction/generation of valid auth material (T1606 Forge Web Credentials).

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A weak key generation vulnerability exists in specific firmware versions of Milesight AIOT cameras allows authorization to be bypassed.

Deeper analysisAI

A weak key generation vulnerability, tracked as CVE-2026-28747 and associated with CWE-639, affects specific firmware versions of Milesight AIoT cameras. This flaw enables attackers to bypass authorization mechanisms due to insufficiently strong cryptographic keys used in the authentication process. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high potential impact on confidentiality, integrity, and availability.

Exploitation requires an attacker to be on an adjacent network (AV:A) with no privileges (PR:N), though it demands high attack complexity (AC:H) and user interaction (UI:R), such as tricking a user into performing a specific action. Successful exploitation allows bypassing authorization, potentially granting unauthorized access to the camera's functions and data, resulting in high-impact compromise across confidentiality, integrity, and availability without changing scope.

CISA has published ICS Advisory ICSA-26-113-03 detailing the vulnerability, available at cisa.gov and in CSAF JSON format on GitHub. Milesight provides firmware downloads for mitigation at milesight.com/support/download/firmware, recommending affected users update to patched versions to address the weak key generation issue.

Details

CWE(s)

Affected Products

Cisa
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-32589Shared CWE-639
CVE-2026-5845Shared CWE-639
CVE-2026-25147Shared CWE-639
CVE-2025-40805Shared CWE-639
CVE-2026-4503Shared CWE-639
CVE-2026-40600Shared CWE-639
CVE-2023-53955Shared CWE-639
CVE-2026-28216Shared CWE-639
CVE-2026-25927Shared CWE-639
CVE-2025-67165Shared CWE-639

References