CVE-2023-27747

7.5 HIGH

📋 TL;DR

BlackVue DR750-2CH LTE dash cameras running firmware version 1.012_2022.10.26 lack authentication on their web server interface. This allows attackers to access sensitive dashcam configurations and recorded footage without credentials. Anyone using this specific dashcam model with the vulnerable firmware is affected.

💻 Affected Systems

Products:
  • BlackVue DR750-2CH LTE
Versions: v.1.012_2022.10.26
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: This is the default configuration - no authentication is enabled by default on the web interface.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers remotely access all dashcam recordings, potentially obtaining sensitive location data, license plates, and personal information. They could also modify configurations to disable recording or exfiltrate data.

🟠

Likely Case

Unauthorized access to dashcam footage and configuration settings, potentially exposing driving patterns, locations, and vehicle information.

🟢

If Mitigated

With proper network segmentation and firewall rules, the dashcam is isolated from untrusted networks, limiting exposure to local attackers only.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability requires no authentication, making exploitation trivial. Public GitHub repositories demonstrate access techniques.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://blackvue.com

Restart Required: No

Instructions:

Check BlackVue website for firmware updates. If available, download and install via the BlackVue mobile app or SD card method.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the dashcam on a separate VLAN or network segment with no internet access

Firewall Rules

all

Block all external access to the dashcam's web interface (typically port 80/443)

🧯 If You Can't Patch

  • Disable the dashcam's LTE connectivity if not needed
  • Physically disconnect the dashcam when vehicle is parked for extended periods

🔍 How to Verify

Check if Vulnerable:

Access the dashcam's web interface via its IP address. If you can view configurations/recordings without authentication, it's vulnerable.

Check Version:

Check firmware version in BlackVue mobile app under Settings > Firmware Update

Verify Fix Applied:

After firmware update, attempt to access web interface without credentials - should receive authentication prompt or access denied.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to dashcam web interface
  • Multiple failed authentication attempts if authentication is enabled

Network Indicators:

  • External IP addresses accessing dashcam web interface
  • Unusual traffic to dashcam port 80/443

SIEM Query:

source_ip=external AND dest_port=80 AND dest_ip=dashcam_ip

🔗 References

📤 Share & Export