CVE-2023-6263

8.3 HIGH

📋 TL;DR

This vulnerability allows attackers to spoof legitimate VMS servers in Network Optix NxCloud, enabling them to intercept authorization headers from legitimate users when they connect to the fake server. This affects all users of NxCloud versions before 23.1.0.40440, potentially compromising authentication credentials and enabling further attacks.

💻 Affected Systems

Products:
  • Network Optix NxCloud
Versions: All versions before 23.1.0.40440
Operating Systems: All platforms running NxCloud
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all deployments using vulnerable NxCloud versions regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to user accounts, sensitive video surveillance data, and can pivot to internal networks using stolen credentials.

🟠

Likely Case

Authorization tokens are intercepted, allowing unauthorized access to video streams and system controls.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, but authentication bypass remains possible.

🌐 Internet-Facing: HIGH - The vulnerability involves server spoofing that can be exploited remotely when clients connect to cloud services.
🏢 Internal Only: MEDIUM - Internal clients could be tricked into connecting to spoofed servers, but requires internal network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires setting up a fake VMS server with identical identification to a legitimate one, but no authentication is needed to initiate the attack.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 23.1.0.40440 and later

Vendor Advisory: https://networkoptix.atlassian.net/wiki/spaces/CHS/blog/2023/09/22/3074195467/vulnerability+2023-09-21+-+Server+Spoofing

Restart Required: Yes

Instructions:

1. Download NxCloud version 23.1.0.40440 or later from official sources. 2. Backup current configuration. 3. Stop NxCloud service. 4. Install the updated version. 5. Restart NxCloud service. 6. Verify functionality.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate NxCloud servers and clients to prevent unauthorized network access.

Certificate Pinning

all

Implement certificate validation to prevent connections to untrusted servers.

🧯 If You Can't Patch

  • Implement strict network access controls to limit which servers clients can connect to.
  • Monitor network traffic for unusual connections to non-standard server addresses.

🔍 How to Verify

Check if Vulnerable:

Check NxCloud version via admin interface or configuration files. If version is below 23.1.0.40440, system is vulnerable.

Check Version:

Check NxCloud admin interface or configuration files for version information.

Verify Fix Applied:

Confirm NxCloud version is 23.1.0.40440 or higher and test that clients only connect to authorized servers.

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts from unexpected IPs
  • Multiple connection attempts to same server ID from different locations

Network Indicators:

  • Unusual DNS queries for VMS servers
  • Traffic to non-standard ports or IPs for NxCloud services

SIEM Query:

source="nxcloud" AND (event_type="connection_failed" OR event_type="auth_failure") | stats count by src_ip

🔗 References

📤 Share & Export