FortiGuard Labs researchers have raised an alarm over a surge in malicious attacks targeting TBK DVR devices. Threat actors are attempting to exploit a five-year-old authentication bypass issue, tracked as CVE-2018-9995, in TBK DVR devices to gain administrative privileges and eventually access camera video feeds.
TBK Vision, the video surveillance company providing network CCTV devices, has warned that some models sold by the company, including TBK DVR4104 and DVR4216 devices, are also rebranded and available on the market with various brands such as Novo, CeNova, QSee, Pulnix, XVR 5 in 1, Securus, Night OWL, DVR Login, HVR Login, and MDVR.
In an advisory published by Fortinet, it observed a “Critical” level of attack attempts to exploit an authentication bypass vulnerability in TBK DVR devices, with more than 50,000+ unique IPS detections in April 2023. Tens of thousands of TBK DVRs available under different brands could be easily exploitable due to the public availability of proof-of-concept (PoC) code.
At this time, the vendor has yet to release security patches to address the flaw.
In addition to TBK DVR devices, Fortinet also warns of a spike in exploitation attempts targeting the CVE-2016-20016 vulnerability in MVPower CCTV DVR models. This vulnerability, with a CVSS score of 9.8, is also known as JAWS webserver RCE, and was previously seen to be exploited in the wild through 2017 and ongoing. As a result, users of MVPower CCTV DVR models are advised to upgrade their firmware to the latest version.
FortiGuard Labs has advised TBK Vision users to restrict access to the web interface of the DVR devices to a trusted IP address or range of addresses, if possible. The firm also recommends blocking traffic from external sources on the HTTP and Telnet ports, as well as enabling strong and unique passwords for each user account.