Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

CISA Flags Actively Exploited Digiever NVR Vulnerability Allowing Remote Code Execution

Posted on December 25, 2025December 25, 2025 By CWS

Dec 25, 2025Ravie LakshmananVulnerability / Endpoint Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) added a safety flaw impacting Digiever DS-2105 Professional community video recorders (NVRs) to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation.
The vulnerability, tracked as CVE-2023-52163 (CVSS rating: 8.8), pertains to a case of command injection that permits post-authentication distant code execution.
“Digiever DS-2105 Professional accommodates a lacking authorization vulnerability which might permit for command injection through time_tzsetup.cgi,” CISA stated.

The addition of CVE-2023-52163 to the KEV catalog comes within the a number of studies from Akamai and Fortinet in regards to the exploitation of the flaw by menace actors to ship botnets like Mirai and ShadowV2.
In line with TXOne Analysis safety researcher Ta-Lun Yen, the vulnerability, alongside an arbitrary file learn bug (CVE-2023-52164, CVSS rating: 5.1), stays unpatched as a result of gadget reaching end-of-life (EoL) standing.
Profitable exploitation requires an attacker to be logged into the gadget and carry out a crafted request. Within the absence of a patch, it is suggested that customers keep away from exposing the gadget to the web and alter the default username and password.
CISA can also be recommending that Federal Civilian Government Department (FCEB) companies apply the mandatory mitigations or discontinue use of the product by January 12, 2025, to safe their community from energetic threats.

The Hacker News Tags:Actively, Allowing, CISA, Code, Digiever, Execution, Exploited, Flags, NVR, Remote, Vulnerability

Post navigation

Previous Post: Hackers Exploiting Three-Year-Old FortiGate Vulnerability to Bypass 2FA on Firewalls
Next Post: Fortinet Warns of Active Exploitation of FortiOS SSL VPN 2FA Bypass Vulnerability

Related Posts

Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises Rare Werewolf APT Uses Legitimate Software in Attacks on Hundreds of Russian Enterprises The Hacker News
New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit New HybridPetya Ransomware Bypasses UEFI Secure Boot With CVE-2024-7344 Exploit The Hacker News
FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available FreePBX Servers Targeted by Zero-Day Flaw, Emergency Patch Now Available The Hacker News
Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation Microsoft Office Zero-Day (CVE-2026-21509) – Emergency Patch Issued for Active Exploitation The Hacker News
Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict Iran Slows Internet to Prevent Cyber Attacks Amid Escalating Regional Conflict The Hacker News
GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies GitHub Account Compromise Led to Salesloft Drift Breach Affecting 22 Companies The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns
  • Signs of Concealed Information in Security Management
  • APT36 and SideCopy Target Indian Defense with RATs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Cybercriminals Exploit AI to Distribute macOS Malware
  • Microsoft to Update Windows Secure Boot in 2026
  • Critical SandboxJS Flaw Raises Security Concerns
  • Signs of Concealed Information in Security Management
  • APT36 and SideCopy Target Indian Defense with RATs

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark