Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Massive Mirai Botnet Exploited Zero-Day Vulnerability in AVTECH Cameras

    Massive Mirai Botnet Exploited Zero-Day Vulnerability in AVTECH Cameras

    August 29, 2024

    Researchers have discovered a botnet campaign that is exploiting several vulnerabilities, including a zero-day vulnerability (CVE-2024-7029) in AVTECH closed-circuit television (CCTV) cameras that could allow for remote code execution.

    CVE-2024-7029 has been known for five years but has only been assigned a CVE now, showing the importance of monitoring even unassigned vulnerabilities.

    CVE-2024-7029 Flaw In AVTECH Cameras

    CVE-2024-7029 is a command injection vulnerability in the brightness function of AVTECH IP camera devices. This vulnerability allows an attacker to inject malicious code and execute it on a target system with elevated privileges. The botnet campaign spreads a Mirai variant with string names referencing the COVID-19 pandemic that began in 2020.

    CISA said in its advisory that the vulnerability is easily exploited, classifying it as ‘Exploitable remotely/low attack complexity/public exploits are available/known public exploitation.’

    While the vulnerability was first observed in March 2024, analysis suggests that the threat actor has been active since December 2023. The proof of concept (PoC) for CVE-2024-7029 has been publicly available since 2019, but it did not receive a formal CVE assignment until August 2024. The researchers cite the campaign as an example of the weight of monitoring and reporting on threats, even if they have no formal CVE assignment, as an important precautionary measure.

    However, Akamai researchers clarified that the botnet campaign is not limited to just CVE-2024-7029, but also targets several other vulnerabilities, including several other AVTECH vulnerabilities, a Hadoop YARN RCE, CVE-2014-8361, and CVE-2017-17215.

    The tactic of using older, unpatched vulnerabilities remains a concerning but effective focus for botnet operators.

    Widespread Impact

    The CVE-2024-7029 vulnerability in AVTECH IP cameras affects up to and including AVM1203 firmware versions FullImg-1023-1007-1011-1009. The AVTECH CCTV devices affected by CVE-2024-7029 are still widely used, even though the models in question were discontinued years ago.

    These devices are found in various industries, including transportation authorities and other critical infrastructure entities.

    CISA recommends that users take defensive measures to minimize the risk of exploitation of this vulnerability, such as:

    Minimize the exposure of control system devices and/or systems to the network. Ensure they are not directly accessible from the internet, as this can increase the risk of unauthorized access.
    Isolate the control system networks and remote devices by placing them behind firewalls. This helps to segregate them from the business networks, reducing the potential attack surface.
    When remote access is necessary, use more secure methods, such as virtual private networks (VPNs). Recognize that VPNs may have their own vulnerabilities, so it is important to keep them updated to the most current version available.

    The exploitation of the CVE-2024-7029 Avtech vulnerability shows that vulnerabilities even without a formal CVE assignment may still pose a threat to your organization. There are many vulnerabilities with public exploits or available PoCs that lack formal CVE assignment, and, in some cases, the devices remain unpatched.

    If there is no way to remediate a threat, decommissioning the hardware and software is the recommended way to mitigate security risks and lower the risk of regulatory fines.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleElevate Your Java Applications with MongoDB and Spring AI
    Next Article Iranian APT Peach Sandstorm Deploys Custom Tickler Malware

    Related Posts

    Machine Learning

    Salesforce AI Releases BLIP3-o: A Fully Open-Source Unified Multimodal Model Built with CLIP Embeddings and Flow Matching for Image Understanding and Generation

    May 16, 2025
    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Introducing Automated Risk Analysis in Relational Migrator

    Databases

    Google wants to remove Chrome’s compact mode for good

    Operating Systems

    Kodeco Podcast: App Marketing Secrets – Podcast V2, S3 E2 [FREE]

    Development

    How to Use JSON Data Fields in MySQL Databases

    Development
    GetResponse

    Highlights

    Development

    xLSTM: Enhancing Long Short-Term Memory LSTM Capabilities for Advanced Language Modeling and Beyond

    May 10, 2024

    Despite their significant contributions to deep learning, LSTMs have limitations, notably in revising stored information.…

    Call of Duty introduces a new Operator bundle to raise funds for fire relief in LA

    January 22, 2025

    Microsoft will enhance the Edge Sidebar with Copilot Chat agents

    April 7, 2025

    If you’re not working on quantum-safe encryption now, it’s already too late

    February 6, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.