CVE-2023-31996

8.8 HIGH

📋 TL;DR

This vulnerability allows remote attackers to execute arbitrary commands on Hanwha IP Camera ANE-L7012R devices by exploiting improper input sanitization in the NAS storage test function. Attackers can gain full control of affected cameras, potentially compromising video feeds and network security. Organizations using these specific camera models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Hanwha IP Camera ANE-L7012R
Versions: 1.41.01
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects specific camera model with exact firmware version. NAS storage test function must be accessible.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to persistent backdoor installation, video feed interception, lateral movement to internal networks, and use as botnet nodes for DDoS attacks.

🟠

Likely Case

Unauthorized access to camera controls, video feed manipulation, credential theft, and device configuration changes.

🟢

If Mitigated

Limited to isolated camera compromise without network propagation if proper segmentation and monitoring are in place.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Command injection vulnerabilities typically have low exploitation complexity once the attack vector is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Later than 1.41.01

Vendor Advisory: https://hanwhavisionamerica.com/download/50042/

Restart Required: Yes

Instructions:

1. Download latest firmware from Hanwha support portal. 2. Backup camera configuration. 3. Upload firmware via web interface. 4. Reboot camera. 5. Verify firmware version.

🔧 Temporary Workarounds

Disable NAS Storage Test Function

all

Remove or restrict access to the vulnerable NAS storage test feature

Network Segmentation

all

Isolate cameras on separate VLAN with strict firewall rules

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate cameras from critical networks
  • Deploy network-based IPS/IDS with command injection detection rules

🔍 How to Verify

Check if Vulnerable:

Check firmware version via camera web interface: System > Information > Firmware Version

Check Version:

curl -k https://[CAMERA_IP]/stw-cgi/system.cgi?msubmenu=info&action=view

Verify Fix Applied:

Confirm firmware version is updated beyond 1.41.01 and test NAS storage function with malicious inputs

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in system logs
  • Multiple failed NAS test attempts
  • Unexpected system process creation

Network Indicators:

  • Unusual outbound connections from camera
  • Command and control traffic patterns
  • Unexpected port scanning from camera

SIEM Query:

source="camera_logs" AND ("nas test" OR "command injection" OR "system.cgi")

🔗 References

📤 Share & Export