• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR Devices

You are here: Home / Cyber Security News / Hackers Exploiting 5-year-old Unpatched Vulnerability in TBK DVR Devices

Danger actors are actively exploiting an unpatched 5-12 months-old flaw impacting TBK digital video recording (DVR) gadgets, in accordance to an advisory issued by Fortinet FortiGuard Labs.

The vulnerability in problem is CVE-2018-9995 (CVSS rating: 9.8), a critical authentication bypass issue that could be exploited by remote actors to get elevated permissions.

“The 5-calendar year-outdated vulnerability (CVE-2018-9995) is because of to an error when dealing with a maliciously crafted HTTP cookie,” Fortinet stated in an outbreak warn on Might 1, 2023. “A distant attacker may be in a position to exploit this flaw to bypass authentication and obtain administrative privileges eventually main entry to digicam video clip feeds.”

The network security firm mentioned it observed more than 50,000 tries to exploit TBK DVR equipment utilizing the flaw in the month of April 2023. Regardless of the availability of a evidence-of-concept (PoC) exploit, there are no fixes that address the vulnerability.

The flaw impacts TBK DVR4104 and DVR4216 products traces, which are also rebranded and sold utilizing the names CeNova, DVR Login, HVR Login, MDVR Login, Night time OWL, Novo, QSee, Pulnix, Securus, and XVR 5 in 1.

Furthermore, Fortinet warned of a surge in the exploitation of CVE-2016-20016 (CVSS rating: 9.8), an additional critical vulnerability impacting MVPower CCTV DVR styles, such as Tv set-7104HE 1.8.4 115215B9 and Television7108HE.

Approaching WEBINARLearn to Quit Ransomware with Authentic-Time Protection

Be part of our webinar and master how to stop ransomware attacks in their tracks with authentic-time MFA and services account security.

Save My Seat!

The flaw could allow a remote unauthenticated attacker to execute arbitrary running procedure instructions as root owing to the existence of a web shell that is obtainable over a /shell URI.

“With tens of 1000’s of TBK DVRs obtainable beneath diverse models, publicly-available PoC code, and an simple-to-exploit would make this vulnerability an quick concentrate on for attackers,” Fortinet famous. “The new spike in IPS detections displays that network digital camera equipment keep on being a preferred target for attackers.”

Located this posting fascinating? Comply with us on Twitter  and LinkedIn to read through additional unique articles we article.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « CISA Issues Advisory on Critical RCE Affecting ME RTU Remote Terminal Units
Next Post: Government’s New Fraud Strategy Gets Lukewarm Reception »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • Critical mcp-remote Vulnerability Enables Remote Code Execution, Impacting 437,000+ Downloads
  • Fake Gaming and AI Firms Push Malware on Cryptocurrency Users via Telegram and Discord
  • Four Arrested in £440M Cyber Attack on Marks & Spencer, Co-op, and Harrods
  • What Security Leaders Need to Know About AI Governance for SaaS
  • New ZuRu Malware Variant Targeting Developers via Trojanized Termius macOS App

Copyright © 2025 · AllTech.News, All Rights Reserved.