CVE-2023-45225

9.8 CRITICAL

📋 TL;DR

Multiple Zavio IP camera models with firmware M2.1.6.05 contain stack-based buffer overflow vulnerabilities in XML parsing. Attackers can send specially crafted network requests to execute arbitrary code remotely. Organizations using these specific camera models with vulnerable firmware are affected.

💻 Affected Systems

Products:
  • Zavio CF7500
  • CF7300
  • CF7201
  • CF7501
  • CB3211
  • CB3212
  • CB5220
  • CB6231
  • B8520
  • B8220
  • CD321
Versions: Firmware version M2.1.6.05
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All cameras running the specified firmware version are vulnerable regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of camera system leading to persistent access, lateral movement to other network devices, or use as botnet node.

🟠

Likely Case

Camera compromise allowing video feed interception, credential theft, or denial of service.

🟢

If Mitigated

Limited impact if cameras are isolated in separate VLAN with strict network controls.

🌐 Internet-Facing: HIGH - Directly accessible cameras can be exploited without authentication.
🏢 Internal Only: MEDIUM - Requires attacker to gain internal network access first.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Vulnerability requires sending specially crafted XML but no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware newer than M2.1.6.05

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-23-304-03

Restart Required: Yes

Instructions:

1. Download latest firmware from Zavio support portal. 2. Backup camera configuration. 3. Upload firmware via web interface. 4. Reboot camera. 5. Restore configuration if needed.

🔧 Temporary Workarounds

Network segmentation

all

Isolate cameras in separate VLAN with strict firewall rules.

Access control restrictions

all

Block external access to camera management interfaces.

🧯 If You Can't Patch

  • Remove cameras from internet-facing networks immediately
  • Implement strict network segmentation with firewall rules blocking all unnecessary traffic to cameras

🔍 How to Verify

Check if Vulnerable:

Check firmware version in camera web interface under System > Information.

Check Version:

No CLI command - check via web interface or SNMP if enabled

Verify Fix Applied:

Confirm firmware version is newer than M2.1.6.05 in System > Information.

📡 Detection & Monitoring

Log Indicators:

  • Unusual XML parsing errors
  • Multiple failed authentication attempts
  • Unexpected camera reboots

Network Indicators:

  • Unusual XML payloads to camera ports
  • Traffic from cameras to unexpected external IPs
  • Port scanning from camera IPs

SIEM Query:

source_ip IN (camera_ips) AND (payload CONTAINS "<malformed_xml>" OR dest_port IN (80, 443, 554))

🔗 References

📤 Share & Export