Chinese video surveillance company Hikvision has patched a critical vulnerability that could have enabled attackers to gain administrator access to its Hybrid SAN and cluster storage products. The vulnerability, named CVE-2023-28808, was flagged by Indian CCTV and IoT cybersecurity company Redinent, which warned that impacted systems could be remotely accessed by attackers via the internet.
Hikvision notified its partners of the issue, although it said it had no knowledge of any instances of the vulnerability being exploited in the wild.
The update is included in version 2.3.8-8 for Hybrid SAN and version 1.1.4 for cluster storage devices.
The Hybrid SAN storage products are primarily designed to store CCTV video recordings, but can also be configured to store business data, so an attacker could have deleted both types of information, in addition to backups.
Redinent discovered the vulnerability in December 2022 and notified Hikvision through CERT India in January 2023.
The vulnerability is an access control issue that could have been exploited by sending tailored messages to the targeted device. Hikvision said attackers would need network access to the devices in order to exploit the vulnerability.
It encouraged partners to ensure customers installed the patch and ensure proper cyber hygiene to prevent cyberattacks.
Hikvision is the world’s largest video surveillance equipment maker and its products are used globally, including by several public sector organizations in the US.
However, the company has been criticized by some governments over security concerns, and the US Commerce Department has added the firm to its entity list, citing its alleged role in repressing Uighur Muslims in Xinjiang.