CVE-2023-41612

8.8 HIGH

📋 TL;DR

The Victure PC420 camera firmware version 1.1.39 uses a weak, hardcoded encryption key for the enabled_telnet.dat file on its Micro SD card. This allows attackers with physical or remote access to the SD card to decrypt the file, enable telnet access, and gain unauthorized control of the device. All users of Victure PC420 cameras with firmware 1.1.39 are affected.

💻 Affected Systems

Products:
  • Victure PC420 IP Camera
Versions: 1.1.39
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in the firmware's handling of the enabled_telnet.dat file on the Micro SD card. The weak key is hardcoded in the firmware.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full device compromise allowing attackers to enable telnet, gain root access, install malware, pivot to internal networks, and use the camera for surveillance or botnet participation.

🟠

Likely Case

Attackers with physical access to the SD card or remote access via other vulnerabilities can enable telnet and gain administrative control of the camera.

🟢

If Mitigated

Limited impact if SD card is encrypted with strong keys, telnet is disabled by default, and network segmentation prevents lateral movement.

🌐 Internet-Facing: HIGH - IoT cameras are often exposed to the internet, and this vulnerability could be combined with other exploits for remote compromise.
🏢 Internal Only: MEDIUM - Requires physical access to SD card or other initial access vectors, but once compromised can lead to network pivoting.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires access to the Micro SD card (physical or via other vulnerabilities) to decrypt the enabled_telnet.dat file using the weak key. The decryption method is publicly documented in the reference article.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Check Victure website for firmware updates. If update exists: 1. Download latest firmware from official source. 2. Upload to camera via web interface. 3. Reboot camera.

🔧 Temporary Workarounds

Disable SD Card Functionality

all

Remove or disable the Micro SD card to prevent file access.

Physically remove the Micro SD card from the camera

Network Segmentation

all

Isolate camera on separate VLAN with strict firewall rules.

Configure network switch to place camera on isolated VLAN
Add firewall rules to block all unnecessary inbound/outbound traffic

🧯 If You Can't Patch

  • Physically secure the camera and SD card to prevent unauthorized access
  • Disable telnet service completely if possible through configuration

🔍 How to Verify

Check if Vulnerable:

Check firmware version in camera web interface. If version is 1.1.39, extract enabled_telnet.dat from SD card and attempt decryption with known weak key.

Check Version:

Check camera web interface at Settings > System > Firmware Version

Verify Fix Applied:

Verify firmware version is updated beyond 1.1.39. Test that enabled_telnet.dat uses strong encryption or is properly secured.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected telnet service activation
  • Failed login attempts to telnet
  • SD card access anomalies

Network Indicators:

  • Telnet traffic (port 23) from camera
  • Unusual outbound connections from camera

SIEM Query:

source="camera" AND (event="telnet_enabled" OR port=23)

🔗 References

📤 Share & Export