Original Article Text

Click to Toggle View

Malware exploits 5-year-old zero-day to infect end-of-life IP cameras. The Corona Mirai-based malware botnet is spreading through a 5-year-old remote code execution (RCE) zero-day in AVTECH IP cameras, which have been discontinued for years and will not receive a patch. The flaw, discovered by Akamai's Aline Eliovich, is tracked as CVE-2024-7029 and is a high-severity (CVSS v4 score: 8.7) issue in the "brightness" function of the cameras, allowing unauthenticated attackers to inject commands over the network using specially crafted requests. Specifically, the easy-to-exploit flaw lies in the "brightness" argument in the "action=" parameter of the AVTECH cameras' firmware, intended to allow remote adjustments to the brightness of a camera. The flaw impacts all AVTECH AVM1203 IP cameras running on firmware versions up to Fullmg-1023-1007-1011-1009. Due to the impacted models no longer being supported by the Taiwanese vendor, having reached their end of life (EoL) in 2019, no patch is available to address CVE-2024-7029, and no fixes are expected to be released. The U.S. Cybersecurity and Infrastructure Security Agency released an advisory at the start of the month to warn about CVE-2024-7029 and the availability of public exploits, warning that the cameras are still used in commercial facilities, financial services, healthcare and public health, and transportation systems. Proof of concept (PoC) exploits for the particular flaw have been available since at least 2019, but a CVE was only assigned this month, and no active exploitation had been observed previously. Exploitation underway Corona is a Mirai-based variant that has been around since at least 2020, exploiting various vulnerabilities in IoT devices to propagate. Akamai's SIRT team reports that starting on March 18, 2024, Corona began leveraging CVE-2024-7029 in attacks in the wild, targeting AVM1203 cameras still in service despite them having reached EoL five years ago. The first active campaign we observed began on March 18, 2024, but analysis showed activity for this variant as early as December 2023. The proof of concept (PoC) for CVE-2024-7029 has been publicly available since at least February 2019, but it never had a proper CVE assignment until August 2024. The Corona attacks, as those have been captured in Akamai's honeypots, exploit CVE-2024-7029 to download and execute a JavaScript file, which, in turn, loads the primary botnet payload onto the device. Once nested on the device, the malware connects to its command and control (C2) servers and awaits instructions on executing distributed denial of service (DDoS) attacks. Other flaws targeted by Corona, according to Akamai's analysis, are: Users of AVTECH AVM1203 IP cameras are recommended to take them offline immediately and replace them with newer and actively supported models. As IP cameras are commonly exposed to the internet, making them attractive targets for threat actors, they should always run the latest firmware version to ensure known bugs are fixed. If a device becomes discontinued, it should be replaced with newer models to continue receiving security updates. Furthermore, default credentials should be changed to strong and unique passwords and they should be separated from critical or production networks.

Daily Brief Summary

MALWARE // Malware Uses Outdated IP Cameras to Launch DDoS Attacks

A zero-day vulnerability in AVTECH IP cameras, discontinued since 2019, is being exploited by Corona, a Mirai-based malware.

The vulnerability, identified as CVE-2024-7029, involves a high-severity remote code execution flaw in the camera's brightness setting feature.

The U.S. Cybersecurity and Infrastructure Security Agency has issued an advisory due to the camera's use in sensitive sectors such as healthcare and transportation.

Exploits for this vulnerability, allowing command injection via network requests, have been available publicly since at least 2019 but only recently used in active attacks by Corona.

Beginning March 18, 2024, attackers started exploiting this vulnerability to infect cameras and integrate them into a botnet for DDoS attacks.

AVTECH's inability to provide patches for these EoL devices leaves them permanently vulnerable, prompting recommendations to take the impacted cameras offline and replace them.

Akamai's security team has captured live attack data and is monitoring additional exploits by the Corona botnet relevant to several other IoT vulnerabilities.