CVE-2023-28812

9.1 CRITICAL

📋 TL;DR

A buffer overflow vulnerability in Hikvision web browser plug-in allows attackers to send crafted messages to computers with this plug-in installed, potentially leading to arbitrary code execution or process crashes. This affects users who have installed Hikvision's web browser plug-in for accessing video surveillance systems.

💻 Affected Systems

Products:
  • Hikvision Web Browser Plug-in
Versions: Specific versions not detailed in advisory, but all versions before the fix are affected
Operating Systems: Windows, Linux, macOS (if plug-in supports)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires the Hikvision web browser plug-in to be installed and enabled. Typically used for accessing Hikvision video surveillance systems via web browsers.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with SYSTEM/root privileges, allowing complete system compromise and lateral movement within networks.

🟠

Likely Case

Plug-in crash causing denial of service for video surveillance access, potentially with limited code execution in plug-in context.

🟢

If Mitigated

Plug-in crash only, with no system compromise due to sandboxing or other security controls.

🌐 Internet-Facing: HIGH - Web browser plug-ins can be triggered by visiting malicious websites, making internet-facing systems particularly vulnerable.
🏢 Internal Only: MEDIUM - Internal users could be targeted via phishing or compromised internal websites, but requires user interaction.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Buffer overflow vulnerabilities in browser plug-ins are often easily exploitable. The advisory suggests crafted messages can trigger the vulnerability, indicating relatively simple exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified in advisory, but Hikvision has released updated plug-in versions

Vendor Advisory: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikvision-web-browser-plug-in-locals/

Restart Required: Yes

Instructions:

1. Visit the Hikvision security advisory page. 2. Download the latest version of the web browser plug-in. 3. Uninstall the current plug-in. 4. Install the updated version. 5. Restart the browser and computer.

🔧 Temporary Workarounds

Disable Hikvision Browser Plug-in

all

Temporarily disable the plug-in in browser settings to prevent exploitation

Browser-specific: In Chrome: chrome://extensions/ → Disable Hikvision plug-in
In Firefox: about:addons → Disable Hikvision plug-in

Use Alternative Access Methods

all

Access Hikvision systems via mobile apps or dedicated clients instead of web browser

🧯 If You Can't Patch

  • Network segmentation: Isolate systems with the plug-in from untrusted networks
  • Application control: Block execution of the plug-in via endpoint security tools

🔍 How to Verify

Check if Vulnerable:

Check browser extensions/add-ons list for Hikvision plug-in. If present and not updated to latest version, system is vulnerable.

Check Version:

Browser-specific: Check extensions/add-ons management page for version information

Verify Fix Applied:

Verify plug-in version matches latest version from Hikvision advisory and test video surveillance access functionality.

📡 Detection & Monitoring

Log Indicators:

  • Browser crash logs mentioning Hikvision plug-in
  • Unexpected process creation from browser plug-in context
  • Memory access violation errors in system logs

Network Indicators:

  • Unusual HTTP requests to Hikvision systems with crafted parameters
  • Traffic patterns suggesting buffer overflow attempts

SIEM Query:

source="browser_logs" AND "Hikvision" AND ("crash" OR "access violation" OR "buffer")

🔗 References

📤 Share & Export