CVE-2026-28747
Published: 27 April 2026
Summary
CVE-2026-28747 is a high-severity Authorization Bypass Through User-Controlled Key (CWE-639) vulnerability in Cisa (inferred from references). Its CVSS base score is 7.1 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation of Remote Services (T1210); ranked at the 3.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 IA-5 (Authenticator Management) and SC-12 (Cryptographic Key Establishment and Management).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely flaw remediation, directly addressing the weak key generation vulnerability through application of vendor-provided firmware patches.
Mandates secure cryptographic key establishment and management, preventing weak key generation flaws in firmware authentication processes.
Ensures authenticators including cryptographic keys possess sufficient strength of mechanism to mitigate authorization bypass via weak keys.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Weak cryptographic key generation directly enables authorization bypass on camera remote interfaces (T1210 Exploitation of Remote Services) and allows prediction/generation of valid auth material (T1606 Forge Web Credentials).
NVD Description
A weak key generation vulnerability exists in specific firmware versions of Milesight AIOT cameras allows authorization to be bypassed.
Deeper analysisAI
A weak key generation vulnerability, tracked as CVE-2026-28747 and associated with CWE-639, affects specific firmware versions of Milesight AIoT cameras. This flaw enables attackers to bypass authorization mechanisms due to insufficiently strong cryptographic keys used in the authentication process. The vulnerability carries a CVSS v3.1 base score of 7.1 (AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high potential impact on confidentiality, integrity, and availability.
Exploitation requires an attacker to be on an adjacent network (AV:A) with no privileges (PR:N), though it demands high attack complexity (AC:H) and user interaction (UI:R), such as tricking a user into performing a specific action. Successful exploitation allows bypassing authorization, potentially granting unauthorized access to the camera's functions and data, resulting in high-impact compromise across confidentiality, integrity, and availability without changing scope.
CISA has published ICS Advisory ICSA-26-113-03 detailing the vulnerability, available at cisa.gov and in CSAF JSON format on GitHub. Milesight provides firmware downloads for mitigation at milesight.com/support/download/firmware, recommending affected users update to patched versions to address the weak key generation issue.
Details
- CWE(s)