CVE-2024-5095

6.5 MEDIUM

📋 TL;DR

A denial-of-service vulnerability exists in the MQTT Packet Handler of Victor Zsviot Camera version 8.26.31. Attackers can remotely exploit this vulnerability to crash the camera service, disrupting video monitoring functionality. This affects users of the specific camera model with the vulnerable firmware.

💻 Affected Systems

Products:
  • Victor Zsviot Camera
Versions: 8.26.31
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the specific camera model with MQTT functionality enabled. Other versions may be vulnerable but unconfirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Camera becomes completely unresponsive, requiring physical reboot or factory reset to restore functionality, causing extended surveillance downtime.

🟠

Likely Case

Camera service crashes temporarily, interrupting video feeds and recording until automatic or manual restart occurs.

🟢

If Mitigated

With network segmentation and access controls, impact is limited to isolated camera network segments with minimal operational disruption.

🌐 Internet-Facing: HIGH - The vulnerability is remotely exploitable and public exploit exists, making internet-exposed cameras immediate targets.
🏢 Internal Only: MEDIUM - Internal network cameras are still vulnerable to internal threats or compromised devices, but attack surface is reduced.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploit details are publicly available in GitHub documentation. Attack requires network access to camera's MQTT service (typically port 1883).

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available - vendor did not respond to disclosure

Restart Required: No

Instructions:

No official patch available. Monitor vendor website for firmware updates. Consider replacing with supported hardware if vendor remains unresponsive.

🔧 Temporary Workarounds

Network Segmentation

linux

Isolate camera network from untrusted networks and restrict MQTT port access

iptables -A INPUT -p tcp --dport 1883 -j DROP
iptables -A INPUT -p udp --dport 1883 -j DROP

Disable MQTT Service

all

Turn off MQTT functionality if not required for camera operation

Check camera web interface: Settings > Network > MQTT > Disable

🧯 If You Can't Patch

  • Implement strict network access controls to camera MQTT port (1883/TCP)
  • Deploy network monitoring for abnormal MQTT traffic patterns

🔍 How to Verify

Check if Vulnerable:

Check camera firmware version via web interface: Settings > About > Firmware Version. If version is 8.26.31, device is vulnerable.

Check Version:

curl -s http://camera-ip/cgi-bin/version.cgi | grep Firmware

Verify Fix Applied:

Test MQTT service resilience by sending malformed MQTT packets to port 1883. If service remains stable, mitigation may be working.

📡 Detection & Monitoring

Log Indicators:

  • Camera service restart logs
  • MQTT handler crash messages
  • Abnormal disconnection events

Network Indicators:

  • Malformed MQTT packets to port 1883
  • High volume of MQTT connection attempts
  • Unusual packet sizes in MQTT traffic

SIEM Query:

source="camera_logs" AND ("crash" OR "restart" OR "mqtt error") AND dest_port=1883

🔗 References

📤 Share & Export