CVE-2023-43271

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to bypass access controls on the 70mai A500S driving recorder and directly delete video files via FTP and other protocols. It affects users of the 70mai A500S driving recorder with vulnerable firmware. Attackers can delete critical evidence footage without authentication.

💻 Affected Systems

Products:
  • 70mai A500S driving recorder
Versions: v1.2.119
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability exists in the default configuration of the firmware. No special configuration is required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers delete all video evidence from driving recorders, compromising legal cases, insurance claims, and security investigations.

🟠

Likely Case

Targeted deletion of specific video files to hide evidence of accidents, crimes, or other incidents.

🟢

If Mitigated

No unauthorized access to video files if proper authentication and network controls are implemented.

🌐 Internet-Facing: HIGH - The vulnerability allows unauthenticated access via network protocols, making internet-exposed devices particularly vulnerable.
🏢 Internal Only: MEDIUM - Devices on internal networks are still vulnerable to attackers who gain network access.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to the device but no authentication. Public proof-of-concept demonstrates FTP access to delete files.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch is currently available. Monitor 70mai for firmware updates and apply when released.

🔧 Temporary Workarounds

Disable network services

all

Disable FTP and other unnecessary network services on the driving recorder to prevent remote access.

Network segmentation

all

Isolate the driving recorder on a separate network segment with strict firewall rules blocking external access.

🧯 If You Can't Patch

  • Physically disconnect the device from networks when not in use
  • Implement strict network access controls and monitor for unauthorized connection attempts

🔍 How to Verify

Check if Vulnerable:

Check if FTP service is accessible on the device without authentication. Attempt to connect via FTP to the device IP on port 21.

Check Version:

Check device firmware version in settings menu or via manufacturer's app. Should show v1.2.119 for vulnerable version.

Verify Fix Applied:

Verify that FTP access requires authentication or is disabled. Test that unauthorized users cannot access or delete video files.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized FTP login attempts
  • Unexpected file deletion events in system logs

Network Indicators:

  • FTP connections to the device from unauthorized IP addresses
  • Unusual file transfer patterns

SIEM Query:

source="device_logs" AND (event="ftp_login" AND result="failed") OR (event="file_delete" AND user="unknown")

🔗 References

📤 Share & Export