CVE-2023-33806
📋 TL;DR
Hikvision Interactive Tablet DS-D5B86RB/B version V2.3.0 build220119 has insecure default configurations that allow attackers to execute arbitrary commands. This vulnerability affects organizations using these specific tablets with the vulnerable firmware. Attackers can potentially gain unauthorized access and control over the device.
💻 Affected Systems
- Hikvision Interactive Tablet DS-D5B86RB/B
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete device compromise allowing attackers to execute arbitrary commands, potentially leading to data theft, lateral movement within networks, or device bricking.
Likely Case
Unauthorized command execution leading to device manipulation, data extraction, or installation of persistent backdoors.
If Mitigated
Limited impact with proper network segmentation and access controls, though device remains vulnerable to local network attacks.
🎯 Exploit Status
Public proof-of-concept available in GitHub gist. Exploitation appears straightforward based on insecure defaults.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
Check Hikvision official website for firmware updates. If available, download and apply the latest firmware following vendor instructions.
🔧 Temporary Workarounds
Network Segmentation
allIsolate Hikvision tablets from internet and restrict network access to necessary services only.
Access Control Lists
allImplement strict firewall rules to limit which IP addresses can communicate with the tablets.
🧯 If You Can't Patch
- Remove devices from internet-facing networks immediately
- Implement strict network segmentation and monitor all traffic to/from affected devices
🔍 How to Verify
Check if Vulnerable:
Check device firmware version via web interface or serial console. If version is V2.3.0 build220119, device is vulnerable.
Check Version:
Check via device web interface at System > Version Information or via serial console if available.
Verify Fix Applied:
Verify firmware has been updated to a version newer than V2.3.0 build220119.
📡 Detection & Monitoring
Log Indicators:
- Unusual command execution logs
- Unauthorized access attempts to device services
- Unexpected process creation
Network Indicators:
- Unusual outbound connections from tablets
- Suspicious command and control traffic
- Unexpected port scanning from tablet IPs
SIEM Query:
source_ip IN (tablet_ips) AND (event_type:command_execution OR destination_port:22,23,80,443 FROM external_ips)