CVE-2019-14704

9.8 CRITICAL

📋 TL;DR

This CVE describes a Server-Side Request Forgery (SSRF) vulnerability in MicroDigital N-series camera firmware. Attackers can exploit it by injecting FTP commands via the uploadfile field to make the HTTPD server send unauthorized requests to internal systems. This affects all MicroDigital N-series cameras running firmware versions up to 6400.0.8.5.

💻 Affected Systems

Products:
  • MicroDigital N-series cameras
Versions: Firmware through 6400.0.8.5
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. Requires HTTPD service to be running.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to pivot to internal networks, exfiltrate sensitive data, or use the camera as a proxy for attacks against other internal systems.

🟠

Likely Case

Unauthorized access to internal services, information disclosure from internal systems, and potential use as an attack proxy.

🟢

If Mitigated

Limited impact if network segmentation prevents the camera from accessing sensitive internal systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available on Pastebin. The vulnerability is straightforward to exploit with basic HTTP manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://www.microdigital.co.kr/

Restart Required: Yes

Instructions:

1. Check vendor website for firmware updates. 2. Download latest firmware. 3. Upload to camera via web interface. 4. Reboot camera after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras in separate VLAN with restricted outbound access

Disable HTTPD Service

linux

Turn off the vulnerable HTTPD service if camera management isn't needed

killall httpd
rm /etc/init.d/httpd

🧯 If You Can't Patch

  • Implement strict network ACLs to prevent cameras from accessing internal systems
  • Deploy web application firewall rules to block SSRF patterns

🔍 How to Verify

Check if Vulnerable:

Check firmware version via web interface or SSH. If version is 6400.0.8.5 or earlier, system is vulnerable.

Check Version:

cat /etc/version or check web interface system info

Verify Fix Applied:

Verify firmware version is above 6400.0.8.5. Test SSRF payloads should fail.

📡 Detection & Monitoring

Log Indicators:

  • Unusual FTP connection attempts from camera IP
  • HTTP requests to internal IPs from camera

Network Indicators:

  • Camera making unexpected outbound connections
  • FTP traffic from camera to internal systems

SIEM Query:

source_ip="camera_ip" AND (dest_port=21 OR dest_ip="internal_range")

🔗 References

📤 Share & Export