CVE-2023-2306

10.0 CRITICAL

📋 TL;DR

Qognify NiceVision versions 3.1 and prior contain hard-coded credentials that allow attackers to access sensitive information and modify database records. This affects all organizations using vulnerable versions of this video management software. Attackers can retrieve camera details, user information, and alter system data.

💻 Affected Systems

Products:
  • Qognify NiceVision
Versions: 3.1 and prior
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to view all camera feeds, steal user credentials, manipulate surveillance data, and potentially pivot to other network systems.

🟠

Likely Case

Unauthorized access to surveillance footage, theft of user credentials, and manipulation of camera configurations or recorded evidence.

🟢

If Mitigated

Limited impact if system is isolated from internet and attackers lack network access, though insider threats remain possible.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Hard-coded credentials make exploitation trivial once discovered. No authentication required.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version 3.2 or later

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-278-02

Restart Required: Yes

Instructions:

1. Contact Qognify support for patch information. 2. Backup system configuration and data. 3. Apply patch to upgrade to version 3.2 or later. 4. Restart the NiceVision service. 5. Verify functionality.

🔧 Temporary Workarounds

Network Isolation

all

Isolate NiceVision system from internet and restrict network access to authorized IPs only.

Firewall Rules

all

Implement strict firewall rules to block external access to NiceVision ports.

🧯 If You Can't Patch

  • Immediately isolate the system from all networks including internet
  • Implement strict access controls and monitor all connections to the system

🔍 How to Verify

Check if Vulnerable:

Check NiceVision version in application interface or installation directory. Versions 3.1 or earlier are vulnerable.

Check Version:

Check application interface or consult vendor documentation for version verification.

Verify Fix Applied:

Verify version is 3.2 or later and test that hard-coded credentials no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Unusual database access patterns
  • Authentication attempts using default credentials
  • Configuration changes from unexpected sources

Network Indicators:

  • External connections to NiceVision ports
  • Unusual database query patterns
  • Traffic to/from known vulnerable versions

SIEM Query:

source="nicevision" AND (event_type="authentication" AND user="default" OR event_type="database_access" AND source_ip NOT IN authorized_ips)

🔗 References

📤 Share & Export