CVE-2022-24610

8.6 HIGH

📋 TL;DR

This vulnerability in Alecto DVC-215IP cameras allows attackers to bypass password masking on the Wi-Fi configuration page, revealing the network passphrase. This grants unauthorized access to the internal network the camera is connected to. Affected users are those with Alecto DVC-215IP cameras running vulnerable firmware versions.

💻 Affected Systems

Products:
  • Alecto DVC-215IP camera
Versions: 63.1.1.173 and below
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires access to the camera's web interface, typically via local network.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to the internal network, potentially compromising all connected devices, stealing sensitive data, and launching further attacks.

🟠

Likely Case

Local attackers or those with physical access to the camera's web interface can extract Wi-Fi credentials and join the network.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the camera's isolated network segment.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the camera's web interface, which may need authentication. The technique involves simple HTML/CSS manipulation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware version above 63.1.1.173

Vendor Advisory: https://support.alecto.nl/nl/support/solutions/articles/48001210271-kwetsbaarheid-vulnerability-firmware-below-version-63-1-1-173

Restart Required: Yes

Instructions:

1. Download the latest firmware from Alecto's support site. 2. Access the camera's web interface. 3. Navigate to the firmware update section. 4. Upload and apply the new firmware. 5. Reboot the camera.

🔧 Temporary Workarounds

Disable web interface access

all

Restrict access to the camera's web interface to trusted IP addresses only.

Network segmentation

all

Place the camera on an isolated network segment separate from critical systems.

🧯 If You Can't Patch

  • Change the Wi-Fi password immediately and ensure it's not reused elsewhere.
  • Disconnect the camera from the network if not essential, or use a wired connection instead.

🔍 How to Verify

Check if Vulnerable:

Access the camera's web interface, navigate to Settings > Network > Wireless, and inspect the password field's HTML/CSS for masking styles that can be removed.

Check Version:

Check the firmware version in the camera's web interface under Settings > System Information.

Verify Fix Applied:

After updating firmware, verify the password field properly masks the passphrase and cannot be revealed through HTML/CSS manipulation.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to the camera's web interface settings page
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • Unauthorized devices joining the Wi-Fi network
  • Unusual traffic from the camera's IP address

SIEM Query:

source="camera_logs" AND (event="settings_access" OR event="wireless_config_change")

🔗 References

📤 Share & Export