CISA Adds Digiever DS-2105 Pro Flaw to KEV Amid Attacks Now!

CISA adds CVE-2023-52163 to KEV: post-auth command injection in EoL Digiever DS-2105 Pro NVRs exploited to deploy Mirai/ShadowV2 — avoid internet exposure and change default credentials.

  • CISA has added a vulnerability affecting Digiever DS-2105 Pro NVRs to its KEV alert and Known Exploited Vulnerabilities (KEV) catalog.
  • The flaw, CVE-2023-52163 (CVSS 8.8), permits post-authentication command injection leading to remote code execution.
  • Security firms including Akamai and Fortinet reported active exploitation to install botnets such as Mirai and ShadowV2.
  • TXOne Research notes the device is end-of-life and the vulnerability remains unpatched; users should avoid internet exposure and change default credentials.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a security flaw affecting Digiever DS-2105 Pro network video recorders to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The issue is tracked as CVE-2023-52163 and carries a CVSS score of 8.8.

- Advertisement -

CISA described the problem as, “Digiever DS-2105 Pro contains a missing authorization vulnerability which could allow for command injection via time_tzsetup.cgi,” and noted that exploitation enables post-authentication remote code execution. Command injection is a flaw that allows attackers to run system commands on the device. Remote code execution (RCE) is the ability to run code on a device from another system.

Reports from security vendors including Akamai and Fortinet show threat actors exploited this bug to deploy botnets such as Mirai and ShadowV2. A second issue, CVE-2023-52164, is an arbitrary file read vulnerability with a CVSS score of 5.1 and also remains unpatched.

According to researcher Ta-Lun Yen at TXOne Research, the DS-2105 Pro has reached end-of-life (EoL), meaning the vendor no longer provides updates, which leaves the flaws unpatched. Successful attacks require valid device credentials and a crafted request.

In lieu of a vendor patch, users should avoid exposing the device to the internet and change default usernames and passwords. CISA urges Federal Civilian Executive Branch agencies to apply mitigations or discontinue use of the product by January 12, 2025.

- Advertisement -

✅ Follow BITNEWSBOT on Telegram, Facebook, LinkedIn, X.com, and Google News for instant updates.

Previous Articles:

- Advertisement -

Latest News

Waymo Targets 1M Weekly Paid Rides by 2026

Waymo, owned by Alphabet, aims to surpass one million paid rides per week by...

Microsoft: Firms Use AI Buttons to Poison Chatbot Memories

A disturbing new digital manipulation tactic has been uncovered by Microsoft security researchers, who...

Aave Lab Offers Revenue, New Focus to DAO’s End Feud

Aave Labs has proposed a new framework directing all revenue from Aave-branded products to...

Soldier used military secrets for $150K crypto bets.

An Israeli reserve soldier and a civilian accomplice face charges for allegedly using military...

BitGo, 21Shares Expand ETF Staking & Custody Partnership

BitGo and 21Shares have expanded their partnership to provide custody, trading, and staking services...

Must Read

How Much Money Do You Need To Start In Crypto?

TL;DR -If you are wondering How Much Money Do You Need To Start In Crypto, note that is less than you are probably thinking....
🔥 #AD Get 20% OFF any new 12 month hosting plan from Hostinger. Click here!