CISA Adds Digiever DS-2105 Pro Flaw to KEV Amid Attacks Now!

CISA adds CVE-2023-52163 to KEV: post-auth command injection in EoL Digiever DS-2105 Pro NVRs exploited to deploy Mirai/ShadowV2 — avoid internet exposure and change default credentials.

  • CISA has added a vulnerability affecting Digiever DS-2105 Pro NVRs to its KEV alert and Known Exploited Vulnerabilities (KEV) catalog.
  • The flaw, CVE-2023-52163 (CVSS 8.8), permits post-authentication command injection leading to remote code execution.
  • Security firms including Akamai and Fortinet reported active exploitation to install botnets such as Mirai and ShadowV2.
  • TXOne Research notes the device is end-of-life and the vulnerability remains unpatched; users should avoid internet exposure and change default credentials.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw affecting Digiever DS-2105 Pro network video recorders to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The issue is tracked as CVE-2023-52163 and carries a CVSS score of 8.8.

- Advertisement -

CISA described the problem as, “Digiever DS-2105 Pro contains a missing authorization vulnerability which could allow for command injection via time_tzsetup.cgi,” and noted that exploitation enables post-authentication remote code execution. Command injection is a flaw that allows attackers to run system commands on the device. Remote code execution (RCE) is the ability to run code on a device from another system.

Reports from security vendors including Akamai and Fortinet show threat actors exploited this bug to deploy botnets such as Mirai and ShadowV2. A second issue, CVE-2023-52164, is an arbitrary file read vulnerability with a CVSS score of 5.1 and also remains unpatched.

According to researcher Ta-Lun Yen at TXOne Research, the DS-2105 Pro has reached end-of-life (EoL), meaning the vendor no longer provides updates, which leaves the flaws unpatched. Successful attacks require valid device credentials and a crafted request.

In lieu of a vendor patch, users should avoid exposing the device to the internet and change default usernames and passwords. CISA urges Federal Civilian Executive Branch agencies to apply mitigations or discontinue use of the product by January 12, 2025.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Tesla shares slip as Q4 deliveries deemed largely neutral US

Tesla delivered 418,227 vehicles in Q4, slightly below the 422,850 company-polled consensus and last...

Institutions Pour In: 2026 Poised to Ignite ETH Value Rise!!

Ethereum insiders say 2026 could trigger significant ETH value growth as institutions increase on-chain...

EU Debates Digital Euro Privacy, Holding Limits: Compromises

The EU Council has endorsed the European Central Bank design for a digital euro...

Iran Military Export Center Accepts Crypto Payments for Arms

Mindex is accepting cryptocurrency for sales of advanced weapons systems.Buyers can pay with crypto,...

BRICS Accelerates De-Dollarization: Unit, CBDCs, Payments…

India assumed the BRICS presidency and is steering a 2026 push to reduce reliance...
- Advertisement -

Must Read

How to Set Up a Simple Bitcoin Tip Jar for Your Site or Stream

QUICK LINKSWhat a tip jar is, in plain wordsWhat you needBuild a payment link that just worksAdd a QR code that actually scansWhere to...
Bitcoin (BTC) $ 90,474.00 2.54%
Ethereum (ETH) $ 3,125.56 4.58%
XRP (XRP) $ 1.99 6.30%
Bittensor (TAO) $ 243.96 7.84%
Polkadot (DOT) $ 2.05 5.93%
Cardano (ADA) $ 0.388063 10.24%
Chainlink (LINK) $ 13.25 6.68%
Hyperliquid (HYPE) $ 24.50 0.19%
Monero (XMR) $ 422.34 0.40%
Hedera (HBAR) $ 0.11991 7.68%
Toncoin (TON) $ 1.90 12.82%