CVE-2023-43755
📋 TL;DR
Multiple Zavio IP camera models with firmware M2.1.6.05 contain stack-based buffer overflow vulnerabilities in XML parsing. Attackers can send specially crafted network requests to execute arbitrary code remotely. This affects organizations using these specific camera models with vulnerable firmware.
💻 Affected Systems
- Zavio CF7500
- CF7300
- CF7201
- CF7501
- CB3211
- CB3212
- CB5220
- CB6231
- B8520
- B8220
- CD321
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Full system compromise allowing attackers to execute arbitrary code, pivot to internal networks, disable cameras, or use devices as botnet nodes.
Likely Case
Camera compromise leading to surveillance disruption, data exfiltration, or lateral movement within the network.
If Mitigated
Limited impact if cameras are isolated in separate VLANs with strict network controls and no internet exposure.
🎯 Exploit Status
Vulnerability requires sending specially crafted XML requests to the camera's network interface.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor for updated firmware
Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03
Restart Required: Yes
Instructions:
1. Check current firmware version. 2. Contact Zavio/vendor for updated firmware. 3. Backup camera configuration. 4. Apply firmware update. 5. Reboot camera. 6. Verify updated version.
🔧 Temporary Workarounds
Network Segmentation
allIsolate cameras in separate VLAN with strict firewall rules
Access Control
allBlock external access to camera management interfaces
🧯 If You Can't Patch
- Segment cameras in isolated network with no internet access
- Implement strict firewall rules to block all unnecessary inbound traffic to cameras
🔍 How to Verify
Check if Vulnerable:
Check camera web interface or configuration for firmware version M2.1.6.05
Check Version:
Check via camera web interface or vendor-specific CLI commands
Verify Fix Applied:
Verify firmware version is no longer M2.1.6.05 after update
📡 Detection & Monitoring
Log Indicators:
- Unusual XML parsing errors
- Multiple failed authentication attempts
- Unexpected camera reboots
Network Indicators:
- Unusual XML traffic to camera ports
- Traffic patterns suggesting exploitation attempts
SIEM Query:
source_ip='camera_network' AND (protocol='http' OR protocol='https') AND payload_contains='malformed_xml'