CISA Adds Digiever DS-2105 Pro Flaw to KEV Amid Attacks Now!

CISA adds CVE-2023-52163 to KEV: post-auth command injection in EoL Digiever DS-2105 Pro NVRs exploited to deploy Mirai/ShadowV2 — avoid internet exposure and change default credentials.

  • CISA has added a vulnerability affecting Digiever DS-2105 Pro NVRs to its KEV alert and Known Exploited Vulnerabilities (KEV) catalog.
  • The flaw, CVE-2023-52163 (CVSS 8.8), permits post-authentication command injection leading to remote code execution.
  • Security firms including Akamai and Fortinet reported active exploitation to install botnets such as Mirai and ShadowV2.
  • TXOne Research notes the device is end-of-life and the vulnerability remains unpatched; users should avoid internet exposure and change default credentials.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw affecting Digiever DS-2105 Pro network video recorders to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The issue is tracked as CVE-2023-52163 and carries a CVSS score of 8.8.

- Advertisement -

CISA described the problem as, “Digiever DS-2105 Pro contains a missing authorization vulnerability which could allow for command injection via time_tzsetup.cgi,” and noted that exploitation enables post-authentication remote code execution. Command injection is a flaw that allows attackers to run system commands on the device. Remote code execution (RCE) is the ability to run code on a device from another system.

Reports from security vendors including Akamai and Fortinet show threat actors exploited this bug to deploy botnets such as Mirai and ShadowV2. A second issue, CVE-2023-52164, is an arbitrary file read vulnerability with a CVSS score of 5.1 and also remains unpatched.

According to researcher Ta-Lun Yen at TXOne Research, the DS-2105 Pro has reached end-of-life (EoL), meaning the vendor no longer provides updates, which leaves the flaws unpatched. Successful attacks require valid device credentials and a crafted request.

In lieu of a vendor patch, users should avoid exposing the device to the internet and change default usernames and passwords. CISA urges Federal Civilian Executive Branch agencies to apply mitigations or discontinue use of the product by January 12, 2025.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

GameStop Transfers 4,710 BTC to Coinbase Prime; May Sell Now

GameStop moved its entire Bitcoin holding of 4,710 BTC to Coinbase Prime.CryptoQuant flagged the...

SEC Drops Gemini Suit After $40M Push to Restore Earn Today!

SEC civil suit against Gemini Trust Company and Genesis Global Capital dismissed with prejudice...

DeFi surge, three hacks and MEV bot returns majority funds!!

Three separate DeFi attacks this week drained millions and prompted on-chain recovery efforts.Makina reported...

BitGo shares tumble 22% after $212M IPO; dip below $15 at 2B

BitGo shares fell nearly 22% on the second trading day after its IPO debut...

Intel Slides 17% After Q1 Guidance Miss; Supply Constraints.

INTC shares fell more than 17% on Friday after a quarterly report and weak...
- Advertisement -

Must Read

9 Best Books On Ethereum And Blockchain Technology

QUICK LINKSHow to Choose Your First Blockchain Book: A Simple Framework1. Define Your Goal: Are you looking to Build, Invest, or Understand?2. Assess Your...
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!