OTPulse

AVTECH IP camera

Act Now8.8ICS-CERT ICSA-24-214-07Aug 1, 2024
Attack VectorNetwork
Auth RequiredLow
ComplexityLow
User InteractionNone needed
Summary

AVTECH AVM1203 IP cameras contain a command injection vulnerability (CWE-77) that allows authenticated attackers to inject and execute arbitrary commands on the device with the privileges of the running process. The vulnerability exists in firmware versions up to FullImg-1023-1007-1011-1009. AVTECH has not responded to CISA mitigation requests and no security update is planned for this product.

What this means
What could happen
An attacker with valid login credentials could run arbitrary commands on the IP camera with the privileges of the running process, potentially disabling video surveillance or using the camera as a pivot point to attack the facility network.
Who's at risk
Organizations operating AVTECH AVM1203 IP cameras for facility monitoring, surveillance of critical infrastructure, or perimeter security. This affects municipal utilities, water authorities, power plants, and any industrial facility using these cameras for safety and security monitoring.
How it could be exploited
An attacker with valid credentials logs into the AVM1203 camera's web interface or API, then injects command strings into an input field (likely one that passes unsanitized user input to the system shell). The commands execute with the permissions of the camera's process owner, allowing the attacker to modify camera configuration, disable monitoring, or establish a foothold on the device.
Prerequisites
  • Valid login credentials for the AVM1203 camera
  • Network access to the camera's web interface or management port (typically 80/443)
  • Knowledge of a command injection point in the camera application
remotely exploitablehigh CVSS score (8.8)high EPSS score (92.8%)requires authentication but credentials may be weak or defaultno patch availableaffects security monitoring systems
Exploitability
High exploit probability (EPSS 92.8%)
Affected products (1)
ProductAffected VersionsFix Status
AVM1203: <=firmware_FullImg-1023-1007-1011-1009≤ firmware FullImg-1023-1007-1011-1009No fix (EOL)
Remediation & Mitigation
0/6
Do now
0/2
HARDENINGRestrict network access to the AVM1203 camera to authorized management systems only using firewall rules; do not expose the camera to the internet or untrusted networks
HARDENINGChange all default credentials and enforce strong, unique passwords for camera management accounts
Schedule — requires maintenance window
0/3

Patching may require device reboot — plan for process interruption

HARDENINGIsolate the camera onto a dedicated industrial network segment separate from business networks
HARDENINGIf remote access is required, route all traffic through a VPN or bastion host and enforce multi-factor authentication
HARDENINGMonitor for suspicious login activity and command execution on the camera
Long-term hardening
0/1
WORKAROUNDContact AVTECH to inquire about security updates or end-of-life status; consider replacing the camera if no patch becomes available
↑↓ Navigate · Esc Close
API: /api/v1/advisories/952169f3-2dde-4826-b781-8e45d1833051