CVE-2023-50685

7.5 HIGH

📋 TL;DR

A remote attacker can cause a denial of service in Hipcam Cameras RealServer v1.0 by sending a crafted script to the client_port parameter. This vulnerability affects systems running the vulnerable RealServer software, potentially disrupting camera streaming services.

💻 Affected Systems

Products:
  • Hipcam Cameras RealServer
Versions: v1.0
Operating Systems: Unknown - likely embedded Linux on camera devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the RTSP (Real Time Streaming Protocol) service on Hipcam cameras using RealServer v1.0.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete service disruption of affected Hipcam camera streaming, rendering cameras inaccessible for monitoring or recording.

🟠

Likely Case

Temporary service interruption requiring manual restart of the RealServer software or affected cameras.

🟢

If Mitigated

Minimal impact with proper network segmentation and monitoring to detect and block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending crafted data to the client_port parameter, which appears to be straightforward based on the CWE-400 (Uncontrolled Resource Consumption) classification.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

No official patch available. Check with Hipcam vendor for updated firmware or software versions.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Hipcam cameras on a separate network segment with restricted access to the RealServer service.

Firewall Rules

all

Implement firewall rules to restrict access to the RTSP port (typically 554) to authorized systems only.

🧯 If You Can't Patch

  • Implement network monitoring to detect unusual traffic patterns to camera RTSP ports
  • Consider replacing affected cameras with models from vendors providing security updates

🔍 How to Verify

Check if Vulnerable:

Check if Hipcam cameras are running RealServer v1.0 via device management interface or by examining network traffic on port 554.

Check Version:

Check camera web interface or use manufacturer's management tools to determine software version.

Verify Fix Applied:

Verify camera firmware version has been updated beyond v1.0 or test with controlled exploitation attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual connection attempts to RTSP port (554)
  • RealServer service crash or restart logs
  • High resource consumption alerts

Network Indicators:

  • Malformed RTSP requests to client_port parameter
  • Unusual traffic patterns to camera IPs on port 554

SIEM Query:

source_ip="*" AND dest_port=554 AND (protocol="RTSP" OR payload_contains="client_port")

🔗 References

📤 Share & Export