CVE-2023-38024

9.8 CRITICAL

📋 TL;DR

This vulnerability allows remote attackers to access SpotCam FHD 2 devices via hidden Telnet using hard-coded credentials. Attackers can execute arbitrary system commands or disrupt services without authentication. All users of affected SpotCam devices are at risk.

💻 Affected Systems

Products:
  • SpotCam Co., Ltd. SpotCam FHD 2
Versions: All versions with hidden Telnet function
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: The hidden Telnet function with hard-coded credentials appears to be a default feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing installation of persistent malware, data exfiltration, or use in botnets for DDoS attacks.

🟠

Likely Case

Unauthorized access leading to camera feed interception, device configuration changes, or service disruption.

🟢

If Mitigated

Limited impact if Telnet is disabled or network access is restricted, though hard-coded credentials remain a risk.

🌐 Internet-Facing: HIGH - Devices exposed to internet can be directly attacked without authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only Telnet access with known hard-coded credentials.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: https://www.twcert.org.tw/tw/cp-132-7331-9099e-1.html

Restart Required: No

Instructions:

No official patch available. Contact SpotCam vendor for firmware updates or mitigation guidance.

🔧 Temporary Workarounds

Disable Telnet Service

all

Disable the hidden Telnet service if possible through device configuration.

Check device admin interface for Telnet/service management options

Network Segmentation

linux

Isolate SpotCam devices on separate VLANs with strict firewall rules.

iptables -A INPUT -p tcp --dport 23 -j DROP
ufw deny 23/tcp

🧯 If You Can't Patch

  • Block Telnet port 23 at network perimeter and internal firewalls
  • Monitor for Telnet connection attempts and unauthorized access patterns

🔍 How to Verify

Check if Vulnerable:

Attempt Telnet connection to device port 23 using known hard-coded credentials (not publicly disclosed).

Check Version:

Check device firmware version through web interface or contact vendor.

Verify Fix Applied:

Verify Telnet port 23 is closed or requires authentication, and no unauthorized access is possible.

📡 Detection & Monitoring

Log Indicators:

  • Telnet connection logs
  • Unauthorized login attempts
  • Unusual system command execution

Network Indicators:

  • Telnet traffic to port 23
  • Unusual outbound connections from device

SIEM Query:

source_port=23 OR destination_port=23 AND (device_type="SpotCam" OR device_vendor="SpotCam")

🔗 References

📤 Share & Export