CVE-2019-5997

9.8 CRITICAL

📋 TL;DR

CVE-2019-5997 is a critical code injection vulnerability in Video Insight VMS that allows remote attackers to execute arbitrary code on affected systems. This affects all Video Insight VMS installations prior to version 7.6.1. Attackers can potentially take full control of vulnerable systems without authentication.

💻 Affected Systems

Products:
  • Video Insight VMS
Versions: All versions prior to 7.6.1
Operating Systems: Windows Server
Default Config Vulnerable: ⚠️ Yes
Notes: Video Insight VMS is typically deployed on Windows Server environments for video surveillance management.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise leading to data theft, ransomware deployment, lateral movement within networks, and persistent backdoor installation.

🟠

Likely Case

Remote code execution allowing attackers to install malware, exfiltrate surveillance footage, or disrupt video monitoring operations.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, potentially only affecting the VMS application itself.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows remote code injection via unspecified vectors, suggesting relatively straightforward exploitation for attackers with knowledge of the vectors.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 7.6.1

Vendor Advisory: http://downloadvi.com/downloads/IPServer/v7.6/76148/v76148RN.pdf

Restart Required: Yes

Instructions:

1. Download Video Insight VMS version 7.6.1 or later from official vendor sources. 2. Backup current configuration and database. 3. Run the installer to upgrade to the patched version. 4. Restart the Video Insight VMS service and verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Video Insight VMS systems from untrusted networks and internet access

Access Control Lists

all

Implement strict firewall rules to limit access to Video Insight VMS ports

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate Video Insight VMS from other critical systems
  • Deploy web application firewall (WAF) with code injection protection rules

🔍 How to Verify

Check if Vulnerable:

Check Video Insight VMS version in the application interface or installation directory. Versions below 7.6.1 are vulnerable.

Check Version:

Check the application interface or navigate to the installation directory and examine version information files.

Verify Fix Applied:

Verify the installed version is 7.6.1 or higher in the application interface or via the version file in the installation directory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation from Video Insight VMS service
  • Suspicious network connections from VMS server
  • Unexpected file modifications in VMS directories

Network Indicators:

  • Unusual outbound connections from VMS server
  • Suspicious payloads in HTTP requests to VMS web interface

SIEM Query:

source="VideoInsight" AND (process_name="cmd.exe" OR process_name="powershell.exe" OR process_name="wscript.exe")

🔗 References

📤 Share & Export