CVE-2023-33741
📋 TL;DR
The Macrovideo v380pro security camera firmware v1.4.97 exposes device credentials when sharing camera access. This allows unauthorized users to obtain the device ID and password, potentially compromising the camera feed and device control. All users of this specific firmware version are affected.
💻 Affected Systems
- Macrovideo v380pro security camera
📦 What is this software?
V380 Pro by Macro Video
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full control of security cameras, access live feeds, manipulate recordings, disable security monitoring, or pivot to internal networks if cameras are on corporate networks.
Likely Case
Unauthorized access to live camera feeds and recorded footage, potentially exposing sensitive visual information from homes or businesses.
If Mitigated
Limited impact if cameras are isolated on separate networks without internet access and strong network segmentation is in place.
🎯 Exploit Status
Exploitation requires intercepting network traffic during device sharing or accessing shared device information. The GitHub reference shows detailed analysis of the vulnerability.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: None known
Restart Required: No
Instructions:
No official patch available. Contact Macrovideo support for firmware updates or replacement options.
🔧 Temporary Workarounds
Disable Device Sharing
allCompletely disable the device sharing feature to prevent credential exposure
Network Isolation
allPlace cameras on isolated VLAN without internet access
🧯 If You Can't Patch
- Replace affected cameras with different models or brands
- Implement strict network segmentation and firewall rules to block all camera internet access
🔍 How to Verify
Check if Vulnerable:
Check camera firmware version in device settings. If version is 1.4.97, device is vulnerable.
Check Version:
Check via camera web interface or mobile app settings
Verify Fix Applied:
Monitor network traffic during device sharing to ensure credentials are not transmitted in clear text
📡 Detection & Monitoring
Log Indicators:
- Multiple failed login attempts
- Unusual access patterns to camera feeds
- Device sharing activity from unknown users
Network Indicators:
- Unencrypted transmission of device credentials
- Unexpected outbound connections from cameras
- Traffic to camera on non-standard ports
SIEM Query:
source="camera_logs" AND (event="share_device" OR event="credential_transmission")