CVE-2023-43271
📋 TL;DR
This vulnerability allows attackers to bypass access controls on the 70mai A500S driving recorder and directly delete video files via FTP and other protocols. It affects users of the 70mai A500S driving recorder with vulnerable firmware. Attackers can delete critical evidence footage without authentication.
💻 Affected Systems
- 70mai A500S driving recorder
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers delete all video evidence from driving recorders, compromising legal cases, insurance claims, and security investigations.
Likely Case
Targeted deletion of specific video files to hide evidence of accidents, crimes, or other incidents.
If Mitigated
No unauthorized access to video files if proper authentication and network controls are implemented.
🎯 Exploit Status
Exploitation requires network access to the device but no authentication. Public proof-of-concept demonstrates FTP access to delete files.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Unknown
Vendor Advisory: Unknown
Restart Required: No
Instructions:
No official patch is currently available. Monitor 70mai for firmware updates and apply when released.
🔧 Temporary Workarounds
Disable network services
allDisable FTP and other unnecessary network services on the driving recorder to prevent remote access.
Network segmentation
allIsolate the driving recorder on a separate network segment with strict firewall rules blocking external access.
🧯 If You Can't Patch
- Physically disconnect the device from networks when not in use
- Implement strict network access controls and monitor for unauthorized connection attempts
🔍 How to Verify
Check if Vulnerable:
Check if FTP service is accessible on the device without authentication. Attempt to connect via FTP to the device IP on port 21.
Check Version:
Check device firmware version in settings menu or via manufacturer's app. Should show v1.2.119 for vulnerable version.
Verify Fix Applied:
Verify that FTP access requires authentication or is disabled. Test that unauthorized users cannot access or delete video files.
📡 Detection & Monitoring
Log Indicators:
- Unauthorized FTP login attempts
- Unexpected file deletion events in system logs
Network Indicators:
- FTP connections to the device from unauthorized IP addresses
- Unusual file transfer patterns
SIEM Query:
source="device_logs" AND (event="ftp_login" AND result="failed") OR (event="file_delete" AND user="unknown")