CVE-2023-0506

8.8 HIGH

📋 TL;DR

This CVE describes a privilege escalation vulnerability in ByDemes Group Airspace CCTV Web Service version 2.616.BY00.11. It allows low-privileged attackers to bypass authorization controls in the Camera Control Panel and gain administrator access. Organizations using this specific version of the CCTV web service are affected.

💻 Affected Systems

Products:
  • ByDemes Group Airspace CCTV Web Service
Versions: 2.616.BY00.11
Operating Systems: Unknown - likely embedded/Linux based
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability is in the Camera Control Panel component specifically. Other versions may also be affected but only this version is confirmed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full administrative control over the CCTV system, potentially disabling cameras, accessing sensitive footage, or using the system as a foothold for further network attacks.

🟠

Likely Case

Unauthorized users escalate privileges to administrator level, gaining control over camera feeds, system settings, and potentially other connected security systems.

🟢

If Mitigated

With proper access controls and network segmentation, impact is limited to the CCTV system itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged access first. The CWE-284 classification indicates improper access control, suggesting manipulation of authorization mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-demes-group-products

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Apply any available patches. 3. Verify authorization controls are properly implemented.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the CCTV system from other network segments to limit potential lateral movement.

Access Control Review

all

Audit and strengthen user permission assignments, ensuring least privilege principles.

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the CCTV web interface
  • Monitor for unusual privilege escalation attempts and review access logs regularly

🔍 How to Verify

Check if Vulnerable:

Check the web service version via the interface or configuration files. If version is 2.616.BY00.11, the system is vulnerable.

Check Version:

Check web interface or configuration files for version information (specific command depends on implementation)

Verify Fix Applied:

Test authorization controls by attempting to access administrator functions with low-privileged accounts after applying mitigations.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed authorization attempts followed by successful admin access from low-privileged accounts
  • Unusual user privilege changes in system logs

Network Indicators:

  • HTTP requests to camera control endpoints from unauthorized IPs or users
  • Unusual traffic patterns to administrative interfaces

SIEM Query:

source="cctv_logs" AND (event_type="privilege_escalation" OR user_role_change="admin")

🔗 References

📤 Share & Export