CVE-2023-33468
📋 TL;DR
This vulnerability allows remote attackers to extract connection confirmation codes from KramerAV VIA Connect (2) and VIA Go (2) devices without physical access to the screen. Attackers can then manipulate the device remotely, potentially gaining unauthorized control. Organizations using affected devices with versions prior to 4.0.1.1326 are at risk.
💻 Affected Systems
- KramerAV VIA Connect (2)
- KramerAV VIA Go (2)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete remote takeover of the device, enabling attackers to intercept communications, manipulate presentations, install malware, or use the device as an entry point into the network.
Likely Case
Unauthorized remote access to the device allowing manipulation of presentations, screen sharing, or device settings without legitimate user knowledge.
If Mitigated
Limited impact if devices are isolated on separate VLANs, have network access controls, and are monitored for unusual connection attempts.
🎯 Exploit Status
Public proof-of-concept available on GitHub demonstrates remote code extraction. Exploitation requires network access to the device.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.0.1.1326 or later
Vendor Advisory: http://kramerav.com
Restart Required: Yes
Instructions:
1. Download firmware version 4.0.1.1326 or later from KramerAV support portal. 2. Access device web interface. 3. Navigate to System > Firmware Update. 4. Upload the firmware file. 5. Confirm update and allow device to restart.
🔧 Temporary Workarounds
Network Segmentation
allIsolate affected devices on separate VLANs with strict firewall rules limiting inbound connections.
Access Control Lists
allImplement network ACLs to restrict which IP addresses can communicate with the devices.
🧯 If You Can't Patch
- Disconnect devices from networks with internet access
- Implement physical security controls to prevent unauthorized physical access to devices
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface at http://[device-ip]/system/info
Check Version:
curl -s http://[device-ip]/system/info | grep -i version
Verify Fix Applied:
Confirm firmware version is 4.0.1.1326 or higher in system information page
📡 Detection & Monitoring
Log Indicators:
- Unusual connection attempts to device management interface
- Multiple failed authentication attempts followed by successful access
Network Indicators:
- Unexpected outbound connections from device
- Traffic to/from device on unusual ports
SIEM Query:
source_ip="device_ip" AND (event_type="authentication" OR event_type="connection") AND result="success"