Article Details
Scrape Timestamp (UTC): 2024-11-15 19:40:59.446
Original Article Text
Click to Toggle View
Botnet exploits GeoVision zero-day to install Mirai malware. A malware botnet is exploiting a zero-day vulnerability in end-of-life GeoVision devices to compromise and recruit them for likely DDoS or cryptomining attacks. The flaw is tracked as CVE-2024-11120 and was discovered by Piort Kijewski of The Shadowserver Foundation. It is a critical severity (CVSS v3.1 score: 9.8) OS command injection problem, allowing unauthenticated attackers to execute arbitrary system commands on the device. "Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device," warns Taiwan's CERT. "Moreover, this vulnerability has already been exploited by attackers, and we have received related reports." According to TWCERT, the vulnerability impacts the following device models: All of these models have reached the end of life and are no longer supported by the vendor, so no security updates are expected. Threat monitoring platform The Shadowserver Foundation reports that approximately 17,000 GeoVision devices are exposed online and are vulnerable to the CVE-2024-11120 flaw. Kijewski told BleepingComputer that the botnet appears to be a Mirai variant, which is usually used as part of DDoS platforms or to perform cryptomining. Most of the exposed devices (9,100) are based in the United States, followed by Germany (1,600), Canada (800), Taiwan (800), Japan (350), Spain (300), and France (250). In general, signs of botnet compromise include devices heating excessively, becoming slow or unresponsive, and having their configuration arbitrarily changed. If you notice any of these symptoms, perform a device reset, change the default admin password to something strong, turn off remote access panels, and place the device behind a firewall. Ideally, these devices should be replaced with actively supported models, but if that's impossible, they should be isolated on a dedicated LAN or subnet and closely monitored.
Daily Brief Summary
A malware botnet is exploiting a zero-day vulnerability (CVE-2024-11120) in GeoVision devices, which are end-of-life and unsupported.
The critical security flaw allows unauthenticated remote attackers to execute arbitrary system commands on the devices.
Approximately 17,000 GeoVision devices are currently exposed online and vulnerable, with nearly 9,100 in the U.S. alone.
The exploited vulnerability is leading to devices being co-opted into botnets for DDoS attacks or cryptomining activities.
The Shadowserver Foundation, a threat monitoring entity, identified and reported the ongoing exploitation of this flaw.
There are no expected vendor updates for these devices due to their end-of-life status, leaving them permanently at risk.
Recommended immediate actions include resetting devices, changing default passwords, disabling remote access, and isolating the devices on secure networks.