{"id":167764,"date":"2024-08-29T12:50:18","date_gmt":"2024-08-29T12:50:18","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=167764"},"modified":"2024-08-29T12:50:19","modified_gmt":"2024-08-29T12:50:19","slug":"corona-mirai-botnet-avtech-cctv-zero-day","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/167764\/malware\/corona-mirai-botnet-avtech-cctv-zero-day.html","title":{"rendered":"Corona Mirai botnet spreads via AVTECH CCTV zero-day\u00a0"},"content":{"rendered":"
<\/div>\n

An instance of the Corona Mirai botnet spreads via AVTECH CCTV zero-day\u00a0and multiple previously known vulnerabilities.<\/h2>\n\n\n\n

Akamai’s Security Intelligence and Response Team (SIRT) has detected a botnet campaign exploiting multiple previously known vulnerabilities and a newly discovered zero-day, tracked as CVE-2024-7029<\/a> (CVSS score: 8.7), in AVTECH CCTV cameras. The flaw is a command injection issue in the brightness function of AVTECH CCTV cameras, which can be exploited for remote code execution (RCE).<\/p>\n\n\n\n

“This RCE zero-day vulnerability was discovered in the brightness function of AVTECH IP camera devices and allows for a\u00a0command injection to spread a Mirai variant on a target system. This can be executed remotely with elevated privileges (running process owner.)” reads the analysis<\/a> published by Akamai.<\/p>\n\n\n\n

In August 2024, US CISA issued an\u00a0industrial control system\u00a0(ICS) advisory<\/a>\u00a0to warn of this vulnerability. \u201cSuccessful exploitation of this vulnerability could allow an attacker to inject and execute commands as the owner of the running process.\u201d reads the advisory<\/strong><\/a> published by CISA.<\/em> \u201cCommands can be injected over the network and executed without authentication.\u201d<\/em><\/p>\n\n\n\n

The vulnerability impacts Avtech AVM1203 IP cameras running firmware versions FullImg-1023-1007-1011-1009 and prior.<\/p>\n\n\n\n

The US agency states that it is suspected that prior versions of other IP cameras and NVR (network video recorder) products are also affected.<\/p>\n\n\n\n

The cyber security expert Larry Cashdollar of Akamai Technologies reported the vulnerability to CISA.<\/gwmw><\/p>\n\n\n\n

Similar to many other botnets<\/a>, this one is also spreading a variant of Mirai malware to its targets.” continues the report.<\/em><\/p>\n\n\n\n

\"AVTECH<\/a><\/figure>\n\n\n\n

<\/gwmw>“In this instance, the botnet is likely using the Corona Mirai variant, which has been referenced by\u00a0other vendors<\/a>\u00a0as early as 2020 in relation to the COVID-19 virus.”\u00a0<\/em><\/p>\n\n\n\n

Upon execution, the bot connects to various hosts via Telnet on specific ports and displays the string “Corona” on infected systems. The malware exploits several vulnerabilities, including CVE-2017-17215<\/a> in Huawei devices, using hard-coded command and control IPs. The bot also targets AVTECH issues<\/a>, a\u00a0Hadoop YARN RCE<\/a>,\u00a0and CVE-2014-8361<\/a>.<\/gwmw><\/gwmw><\/gwmw><\/p>\n\n\n\n

At the time of this writing, the vulnerability is still unpatched. <\/p>\n\n\n\n

“A vulnerability without a formal CVE assignment may still pose a threat to your organization \u2014 in fact, it could be a significant threat. Malicious actors who operate these botnets have been using new or under-the-radar vulnerabilities to proliferate\u00a0malware<\/a>. CVE-2024-7029 is another example of using the latter, which is becoming an increasingly popular attack trend observed by the SIRT.” concludes the report that includes Indicators of Compromise (IoCs). “There are many vulnerabilities with public exploits or available PoCs that lack formal CVE assignment, and, in some cases, the devices remain unpatched.”<\/em><\/p>\n\n\n\n

Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n

Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n

(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, Mirai Botnet)<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"

An instance of the Corona Mirai botnet spreads via AVTECH CCTV zero-day\u00a0and multiple previously known vulnerabilities. Akamai’s Security Intelligence and Response Team (SIRT) has detected a botnet campaign exploiting multiple previously known vulnerabilities and a newly discovered zero-day, tracked as CVE-2024-7029 (CVSS score: 8.7), in AVTECH CCTV cameras. The flaw is a command injection issue […]<\/p>\n","protected":false},"author":1,"featured_media":167780,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[3323,3,5,7,55],"tags":[15324,15323,88,4112,9508,9506,10918,30,687,841,1533,528],"class_list":["post-167764","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-breaking-news","category-cyber-crime","category-hacking","category-malware","category-security","tag-avtech-cctv","tag-corona-mirai-botnet","tag-cybercrime","tag-hacking","tag-hacking-news","tag-information-security-news","tag-it-information-security","tag-malware-2","tag-pierluigi-paganini","tag-security-affairs","tag-security-news","tag-zero-day"],"yoast_head":"\n杭州江阴科强工业胶带有限公司