CISA Adds Digiever DS-2105 Pro Flaw to KEV Amid Attacks Now!

CISA adds CVE-2023-52163 to KEV: post-auth command injection in EoL Digiever DS-2105 Pro NVRs exploited to deploy Mirai/ShadowV2 — avoid internet exposure and change default credentials.

  • CISA has added a vulnerability affecting Digiever DS-2105 Pro NVRs to its KEV alert and Known Exploited Vulnerabilities (KEV) catalog.
  • The flaw, CVE-2023-52163 (CVSS 8.8), permits post-authentication command injection leading to remote code execution.
  • Security firms including Akamai and Fortinet reported active exploitation to install botnets such as Mirai and ShadowV2.
  • TXOne Research notes the device is end-of-life and the vulnerability remains unpatched; users should avoid internet exposure and change default credentials.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw affecting Digiever DS-2105 Pro network video recorders to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The issue is tracked as CVE-2023-52163 and carries a CVSS score of 8.8.

- Advertisement -

CISA described the problem as, “Digiever DS-2105 Pro contains a missing authorization vulnerability which could allow for command injection via time_tzsetup.cgi,” and noted that exploitation enables post-authentication remote code execution. Command injection is a flaw that allows attackers to run system commands on the device. Remote code execution (RCE) is the ability to run code on a device from another system.

Reports from security vendors including Akamai and Fortinet show threat actors exploited this bug to deploy botnets such as Mirai and ShadowV2. A second issue, CVE-2023-52164, is an arbitrary file read vulnerability with a CVSS score of 5.1 and also remains unpatched.

According to researcher Ta-Lun Yen at TXOne Research, the DS-2105 Pro has reached end-of-life (EoL), meaning the vendor no longer provides updates, which leaves the flaws unpatched. Successful attacks require valid device credentials and a crafted request.

In lieu of a vendor patch, users should avoid exposing the device to the internet and change default usernames and passwords. CISA urges Federal Civilian Executive Branch agencies to apply mitigations or discontinue use of the product by January 12, 2025.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Iranian Hackers Target Iraqi Officials via Custom Malware

A suspected Iran-nexus threat actor, tracked as Dust Specter, impersonated Iraq’s Ministry of Foreign...

BRICS Backs Iran as Tensions Rock Markets, India’s Stance Unclear

Escalating Middle East tensions between Israel, Iran, and the US have triggered a global...

Ethereum ETF Inflows Hit 2-Month High Amid Rally

U.S. spot Ethereum ETFs saw their highest inflows in two months at $169 million,...

Analyst: Bitcoin Over $70K Aims for Another Rally

Analyst Ted Pillows says a sustained price above $70,000 gives Bitcoin a "decent chance"...

AI Tool “Scrapling” Bypasses Cloudflare Defense

The new AI library Scrapling can bypass Cloudflare's Turnstile and bot detection systems natively.Decentralized...

Must Read

What Are Sniper Bots Used in Defi Trading?

You've heard about DeFi, but what about sniper bots? These high-speed trading tools are shaking up the crypto scene.But don't fret, you're not...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!