CVE-2023-2306
📋 TL;DR
Qognify NiceVision versions 3.1 and prior contain hard-coded credentials that allow attackers to access sensitive information and modify database records. This affects all organizations using vulnerable versions of this video management software. Attackers can retrieve camera details, user information, and alter system data.
💻 Affected Systems
- Qognify NiceVision
📦 What is this software?
Nicevision by Qognify
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise allowing attackers to view all camera feeds, steal user credentials, manipulate surveillance data, and potentially pivot to other network systems.
Likely Case
Unauthorized access to surveillance footage, theft of user credentials, and manipulation of camera configurations or recorded evidence.
If Mitigated
Limited impact if system is isolated from internet and attackers lack network access, though insider threats remain possible.
🎯 Exploit Status
Hard-coded credentials make exploitation trivial once discovered. No authentication required.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 3.2 or later
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-278-02
Restart Required: Yes
Instructions:
1. Contact Qognify support for patch information. 2. Backup system configuration and data. 3. Apply patch to upgrade to version 3.2 or later. 4. Restart the NiceVision service. 5. Verify functionality.
🔧 Temporary Workarounds
Network Isolation
allIsolate NiceVision system from internet and restrict network access to authorized IPs only.
Firewall Rules
allImplement strict firewall rules to block external access to NiceVision ports.
🧯 If You Can't Patch
- Immediately isolate the system from all networks including internet
- Implement strict access controls and monitor all connections to the system
🔍 How to Verify
Check if Vulnerable:
Check NiceVision version in application interface or installation directory. Versions 3.1 or earlier are vulnerable.
Check Version:
Check application interface or consult vendor documentation for version verification.
Verify Fix Applied:
Verify version is 3.2 or later and test that hard-coded credentials no longer work.
📡 Detection & Monitoring
Log Indicators:
- Unusual database access patterns
- Authentication attempts using default credentials
- Configuration changes from unexpected sources
Network Indicators:
- External connections to NiceVision ports
- Unusual database query patterns
- Traffic to/from known vulnerable versions
SIEM Query:
source="nicevision" AND (event_type="authentication" AND user="default" OR event_type="database_access" AND source_ip NOT IN authorized_ips)