CISA reports actively exploted flaw in Digiever Network Video Recorder
Take action: If you have Digiever DS-2105 Pro network video recorders, make sure they are isolated from the internet and ensure they're only accessible from trusted internal networks. Since this device is end-of-life, there are no security patches for this flaw and is being actively exploited, plan to replace it as soon as possible. Until it's replaced keep it completely isolated behind strict network segmentation.
Learn More
CISA is reporting active exploitation of a critical vulnerability affecting Digiever DS-2105 Pro network video recorders.
Digiever manufactures network video recording solutions used in enterprises, government facilities, and critical infrastructure environments for surveillance and security monitoring purposes. The DS-2105 Pro model serves as a network video recorder managing security camera feeds and video storage over IP networks.
The vulnerability is tracked as CVE-2023-52163 (CVSS score 8.8), a missing authorization flaw that enables authenticated attackers to execute arbitrary commands through the time_tzsetup.cgi interface. Security researchers have observed the vulnerability being actively weaponized by Mirai-style botnets in widespread attacks against exposed Internet of Things (IoT) devices worldwide.
The vulnerability impacts Digiever DS-2105 Pro devices running firmware version 3.1.0.71-11, which is no longer supported by the manufacturer as the product has reached end-of-life status.
Under Binding Operational Directive (BOD) 22-01, Federal Civilian Executive Branch (FCEB) agencies must remediate CVE-2023-52163 by January 12, 2026.
Because the affected Digiever DS-2105 Pro product has reached end-of-life status, no official security patches or firmware updates are available from the vendor. Organizations should consider discontinuing use of affected devices.
Organizations unable to immediately replace vulnerable devices should implement strict network segmentation to isolate vulnerable devices and isolate them from the internet.
All organizations operating Digiever DS-2105 Pro systems should treat this vulnerability as a high priority given the confirmed active exploitation.