CVE-2023-47213

9.8 CRITICAL

📋 TL;DR

First Corporation DVRs contain a hard-coded password vulnerability that allows remote unauthenticated attackers to access and modify device configuration. This affects multiple DVR models from First Corporation, with only some models receiving security updates while others require workarounds.

💻 Affected Systems

Products:
  • First Corporation DVRs including CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, MD-808AB and other unspecified models
Versions: All versions with hard-coded credentials
Operating Systems: Embedded DVR firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only Late models of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, and MD-808AB receive updates. Other products require workarounds.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover allowing attackers to reconfigure DVRs, disable security features, access video feeds, or use devices as part of botnets for DDoS attacks.

🟠

Likely Case

Unauthorized access to video surveillance feeds, device configuration tampering, and potential use of devices in coordinated attacks.

🟢

If Mitigated

Limited impact if devices are behind firewalls with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - DVRs are often exposed to the internet for remote access, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised internal systems could exploit this, but requires network access to DVR devices.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY - Hard-coded credential vulnerabilities are commonly exploited in IoT devices.
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Attackers only need to know the hard-coded password to gain access.

The vulnerability requires network access to the DVR's management interface. Attackers can use automated tools to scan for vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Updates available for Late models only

Vendor Advisory: https://www.c-first.co.jp/information/ddososhirase/

Restart Required: Yes

Instructions:

1. Check if your DVR model is a Late model of CFR-4EABC, CFR-4EAB, CFR-8EAB, CFR-16EAB, MD-404AB, or MD-808AB. 2. If yes, apply firmware update from vendor. 3. If no, implement workarounds. 4. Change all default credentials after update.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate DVRs from internet and restrict network access

Access Control Lists

all

Implement firewall rules to restrict access to DVR management interfaces

🧯 If You Can't Patch

  • Remove DVRs from internet-facing networks and place behind VPN or secure gateway
  • Implement strict network segmentation to isolate DVRs from critical networks

🔍 How to Verify

Check if Vulnerable:

Attempt to access DVR web interface using default/hard-coded credentials. Check device model against affected list.

Check Version:

Check firmware version through DVR web interface or device display

Verify Fix Applied:

Verify firmware version has been updated and test that hard-coded credentials no longer work.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts followed by successful login with default credentials
  • Configuration changes from unknown IP addresses
  • Multiple login attempts from single sources

Network Indicators:

  • Unusual outbound traffic from DVR devices
  • Connections to known malicious IPs from DVRs
  • Port scanning originating from DVR network segments

SIEM Query:

source_ip="DVR_IP" AND (event_type="authentication" AND result="success" AND user="default") OR (event_type="configuration_change" AND user!="authorized_user")

🔗 References

📤 Share & Export