CVE-2020-24217
📋 TL;DR
This vulnerability allows unauthenticated attackers to upload malicious firmware to HiSilicon-based video encoders, potentially leading to remote code execution. It affects IPTV/H.264/H.265 video encoders using the box application. Attackers can exploit this without any credentials.
💻 Affected Systems
- HiSilicon-based IPTV/H.264/H.265 video encoders with box application
📦 What is this software?
H.264 Iptv Encoder 1080p\@60hz Firmware by Jtechdigital
View all CVEs affecting H.264 Iptv Encoder 1080p\@60hz Firmware →
Iptv\/h.264 Video Encoder Firmware by Szuray
View all CVEs affecting Iptv\/h.264 Video Encoder Firmware →
Iptv\/h.265 Video Encoder Firmware by Szuray
View all CVEs affecting Iptv\/h.265 Video Encoder Firmware →
Vecaster 4k Hevc Firmware by Provideoinstruments
Vecaster Hd H264 Firmware by Provideoinstruments
Vecaster Hd Hevc Firmware by Provideoinstruments
Vecaster Hd Sdi Firmware by Provideoinstruments
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to execute arbitrary code, install backdoors, disrupt video services, or pivot to internal networks.
Likely Case
Attackers upload malicious firmware to gain persistent access, disrupt video encoding services, or use devices for botnet activities.
If Mitigated
Unauthorized access attempts are blocked, but service availability might be impacted during attack attempts.
🎯 Exploit Status
Multiple public exploit scripts and detailed technical analysis available. Attack requires only HTTP access to the device.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown specific version - check with device manufacturer/vendor
Vendor Advisory: https://www.kb.cert.org/vuls/id/896979
Restart Required: Yes
Instructions:
1. Contact device manufacturer/vendor for patched firmware. 2. Backup current configuration. 3. Apply firmware update following vendor instructions. 4. Verify update applied successfully. 5. Restart device if required.
🔧 Temporary Workarounds
Network Access Control
linuxRestrict network access to video encoders using firewall rules
iptables -A INPUT -p tcp --dport 80 -s trusted_network -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
Disable Unnecessary Services
linuxDisable HTTP/file-upload services if not required for operation
systemctl stop httpd
systemctl disable httpd
🧯 If You Can't Patch
- Isolate devices in separate VLAN with strict firewall rules allowing only necessary traffic
- Implement network monitoring for unauthorized file upload attempts to the vulnerable endpoint
🔍 How to Verify
Check if Vulnerable:
Attempt unauthenticated HTTP POST to file-upload endpoint (typically /upload or similar) - if it accepts files without authentication, device is vulnerable.
Check Version:
Check device web interface or use vendor-specific CLI commands (varies by manufacturer)
Verify Fix Applied:
Test that file-upload endpoint now requires authentication or returns 403/401 for unauthenticated requests.
📡 Detection & Monitoring
Log Indicators:
- Unauthenticated POST requests to file-upload endpoints
- Unexpected firmware update activities
- System log entries showing file uploads from unauthorized IPs
Network Indicators:
- HTTP POST requests to /upload or similar endpoints without authentication headers
- Unusual outbound connections from video encoders
SIEM Query:
source="video_encoder_logs" AND (http_method="POST" AND uri_path="/upload" AND NOT auth_success="true")
🔗 References
- http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html
- http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html
- https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/
- https://www.kb.cert.org/vuls/id/896979
- http://packetstormsecurity.com/files/159597/HiSilicon-Video-Encoder-Command-Injection.html
- http://packetstormsecurity.com/files/159599/HiSilicon-Video-Encoder-Malicious-Firmware-Code-Execution.html
- https://kojenov.com/2020-09-15-hisilicon-encoder-vulnerabilities/
- https://www.kb.cert.org/vuls/id/896979