CVE-2023-33509
📋 TL;DR
KramerAV VIA GO² devices running software versions below 4.0.1.1326 contain a SQL injection vulnerability that allows attackers to execute arbitrary SQL commands. This affects organizations using KramerAV's VIA GO² collaboration platform for wireless presentation and conferencing. Attackers could potentially access, modify, or delete database contents.
💻 Affected Systems
- KramerAV VIA GO²
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise leading to remote code execution, data exfiltration, or complete system takeover
Likely Case
Database information disclosure, data manipulation, or authentication bypass
If Mitigated
Limited impact with proper input validation and database permissions in place
🎯 Exploit Status
SQL injection vulnerabilities are commonly exploited and weaponized tools exist
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.0.1.1326
Vendor Advisory: https://www.kramerav.com/us/product/via-go2
Restart Required: Yes
Instructions:
1. Log into VIA GO² web interface
2. Navigate to System Settings > Software Update
3. Download and install version 4.0.1.1326 or later
4. Reboot the device after installation
🔧 Temporary Workarounds
Network Segmentation
allIsolate VIA GO² devices from critical networks and internet access
Web Application Firewall
allDeploy WAF with SQL injection protection rules
🧯 If You Can't Patch
- Segment device on isolated VLAN with no internet access
- Implement strict network ACLs to limit access to trusted IPs only
🔍 How to Verify
Check if Vulnerable:
Check web interface version at System Settings > About, verify version is below 4.0.1.1326
Check Version:
curl -k https://<device-ip>/api/system/info | grep version
Verify Fix Applied:
Confirm version shows 4.0.1.1326 or higher in System Settings > About
📡 Detection & Monitoring
Log Indicators:
- Unusual SQL queries in application logs
- Multiple failed login attempts with SQL-like patterns
Network Indicators:
- HTTP requests containing SQL keywords (SELECT, UNION, etc.) to VIA GO² endpoints
SIEM Query:
source="via-go2-logs" AND ("SELECT" OR "UNION" OR "INSERT" OR "DELETE")