CVE-2023-42425

9.8 CRITICAL

📋 TL;DR

This critical vulnerability in Turing Video Turing Edge+ EVC5FD allows remote attackers to execute arbitrary code and access sensitive information through cloud connection components. It affects all systems running version 1.38.6 of the device firmware. Attackers can potentially take full control of affected devices.

💻 Affected Systems

Products:
  • Turing Video Turing Edge+ EVC5FD
Versions: v1.38.6
Operating Systems: Embedded Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All devices with cloud connectivity enabled are vulnerable by default.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise allowing attackers to execute arbitrary code, steal sensitive data, pivot to internal networks, and maintain persistent access.

🟠

Likely Case

Remote code execution leading to data exfiltration, device takeover, and potential lateral movement within the network.

🟢

If Mitigated

Limited impact if devices are isolated from internet and internal networks with strict access controls.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof of concept available on GitHub gist. Exploitation appears straightforward via cloud connection.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: http://turing.com

Restart Required: No

Instructions:

1. Check vendor website for security updates. 2. Apply any available firmware updates. 3. Verify cloud connection security settings.

🔧 Temporary Workarounds

Disable Cloud Connectivity

all

Disable cloud connection features to prevent remote exploitation

Check device web interface for cloud settings
Disable all cloud/remote access features

Network Segmentation

all

Isolate affected devices from internet and critical internal networks

Configure firewall rules to block outbound traffic from device
Place device in isolated VLAN

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate devices
  • Deploy network monitoring and intrusion detection for suspicious traffic

🔍 How to Verify

Check if Vulnerable:

Check device firmware version in web interface or via SSH if accessible. Version 1.38.6 is vulnerable.

Check Version:

Check device web interface or use manufacturer's diagnostic tools

Verify Fix Applied:

Verify firmware version is updated beyond 1.38.6 and cloud connectivity is properly secured.

📡 Detection & Monitoring

Log Indicators:

  • Unusual cloud connection attempts
  • Unexpected process execution
  • Configuration changes

Network Indicators:

  • Suspicious outbound connections to cloud services
  • Unexpected inbound connections to device

SIEM Query:

source_ip=[device_ip] AND (event_type="process_execution" OR event_type="configuration_change")

🔗 References

📤 Share & Export