CVE-2021-40378
📋 TL;DR
This vulnerability allows unauthenticated attackers to delete all data from affected Compro IP camera devices by accessing a specific CGI script. It affects Compro IP70, IP570, IP60, and TN540 devices running vulnerable firmware versions. This is a critical denial-of-service vulnerability that can render devices unusable.
💻 Affected Systems
- Compro IP70
- Compro IP570
- Compro IP60
- Compro TN540
📦 What is this software?
Ip570 Firmware by Comprotech
Ip60 Firmware by Comprotech
Ip70 Firmware by Comprotech
Tn540 Firmware by Comprotech
⚠️ Risk & Real-World Impact
Worst Case
Complete data loss and device bricking requiring factory reset or physical replacement, causing permanent service disruption.
Likely Case
Device becomes inoperable, requiring manual intervention to restore functionality, leading to surveillance downtime.
If Mitigated
No impact if devices are properly segmented and access controls prevent unauthorized CGI script execution.
🎯 Exploit Status
Simple HTTP GET request to /cgi-bin/support/killps.cgi triggers the data deletion. Public exploit code and documentation are available.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: No vendor advisory found
Restart Required: No
Instructions:
No official patch available. Check with Compro Technology for firmware updates. Consider device replacement if no fix is provided.
🔧 Temporary Workarounds
Block CGI Script Access
linuxUse web server configuration or firewall rules to block access to the vulnerable CGI script
iptables -A INPUT -p tcp --dport 80 -m string --string "/cgi-bin/support/killps.cgi" --algo bm -j DROP
iptables -A INPUT -p tcp --dport 443 -m string --string "/cgi-bin/support/killps.cgi" --algo bm -j DROP
Network Segmentation
allIsolate camera devices on separate VLANs with strict access controls
🧯 If You Can't Patch
- Remove devices from internet exposure immediately
- Implement strict network access controls allowing only authorized management systems to communicate with cameras
🔍 How to Verify
Check if Vulnerable:
Check if the CGI script exists by attempting to access http://[camera-ip]/cgi-bin/support/killps.cgi (use caution as this may trigger the vulnerability)
Check Version:
Check device web interface or use manufacturer-specific commands to query firmware version
Verify Fix Applied:
Verify the CGI script is no longer accessible or returns appropriate access denied errors
📡 Detection & Monitoring
Log Indicators:
- HTTP requests to /cgi-bin/support/killps.cgi in web server logs
- Sudden device reboots or configuration resets
Network Indicators:
- HTTP GET requests to killps.cgi endpoint
- Unusual traffic patterns to camera management interfaces
SIEM Query:
source="camera_logs" AND uri="/cgi-bin/support/killps.cgi"
🔗 References
- http://packetstormsecurity.com/files/164024/Compro-Technology-IP-Camera-Denial-Of-Service.html
- https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md
- http://packetstormsecurity.com/files/164024/Compro-Technology-IP-Camera-Denial-Of-Service.html
- https://github.com/icekam/0day/blob/main/Compro-Technology-Camera-has-multiple-vulnerabilities.md