CVE-2022-23227

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in NUUO NVRmini2 network video recorders allows unauthenticated attackers to upload encrypted TAR archives to add arbitrary users, then combine with another flaw to overwrite files and achieve remote code execution as root. It affects NUUO NVRmini2 devices through version 3.11. This enables complete system compromise of affected devices.

💻 Affected Systems

Products:
  • NUUO NVRmini2
Versions: through 3.11
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover with root privileges, allowing attackers to install persistent backdoors, exfiltrate video footage, pivot to internal networks, or use devices for botnet participation.

🟠

Likely Case

Remote code execution leading to device compromise, surveillance footage theft, and potential lateral movement to connected networks.

🟢

If Mitigated

Limited impact if devices are isolated in separate VLANs with strict network segmentation and no internet exposure.

🌐 Internet-Facing: HIGH - Unauthenticated remote exploitation allows attackers to compromise devices directly from the internet.
🏢 Internal Only: HIGH - Even internally, unauthenticated exploitation allows attackers with network access to compromise devices.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Metasploit module available. Exploitation requires chaining with CVE-2011-5325 for full RCE, but both vulnerabilities are well-documented.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Not available

Restart Required: No

Instructions:

No official patch available. Check vendor website for updates. Consider replacing affected devices if no patch is forthcoming.

🔧 Temporary Workarounds

Network Isolation

all

Isolate NVRmini2 devices in separate VLAN with strict firewall rules blocking all inbound traffic except from authorized management stations.

Web Interface Restriction

all

Block access to handle_import_user.php and related vulnerable endpoints via web application firewall or reverse proxy.

🧯 If You Can't Patch

  • Immediately disconnect affected devices from internet and place behind strict firewall with no inbound access
  • Implement network segmentation to isolate NVR devices from critical networks, allowing only outbound connections to required services

🔍 How to Verify

Check if Vulnerable:

Check device web interface for version number. If version is 3.11 or earlier, device is vulnerable. Attempt to access /handle_import_user.php without authentication.

Check Version:

Check web interface login page or system information page for firmware version

Verify Fix Applied:

Verify version is above 3.11. Test that /handle_import_user.php requires authentication and rejects unauthorized TAR uploads.

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated POST requests to /handle_import_user.php
  • Unexpected user account creation
  • File modification in web root directory

Network Indicators:

  • Unusual outbound connections from NVR devices
  • Traffic to known exploit servers
  • Unexpected file uploads to device

SIEM Query:

source_ip="NVR_DEVICE_IP" AND (uri_path="/handle_import_user.php" OR event_description="user creation" OR file_modification="/var/www/*")

🔗 References

📤 Share & Export