Cybersecurity

CISA Flags Actively Exploited DigiEver Flaw Exposing Surveillance Systems to Remote Takeover

December 28, 20253 min read

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical vulnerability affecting DigiEver network video recorders (NVRs) to its Known Exploited Vulnerabilities (KEV) catalog, confirming active exploitation in the wild.

The vulnerability, CVE-2023-52163, impacts DigiEver DS-2105 Pro devices and allows attackers to execute unauthorized commands remotely — without authentication. CISA added the flaw to the KEV list on December 22, 2025, signaling a clear and present threat to organizations running these systems.


🔍 Vulnerability Breakdown

CVE-2023-52163 is a missing authorization flaw (CWE-862) within the
time_tzsetup.cgi interface of DigiEver DS-2105 Pro devices.

Due to improper access controls, attackers can issue commands without valid credentials, effectively bypassing security checks entirely.

This isn’t a sophisticated exploit — it’s a fundamental authorization failure.

Key Risk Factors:

  • 🔓 No authentication required

  • 🌐 Network-accessible attack vector

  • ⚠️ Command execution capability

  • 📹 Direct exposure of surveillance infrastructure

Once exploited, attackers could:

  • Disable or manipulate security footage

  • Interfere with physical security monitoring

  • Use the NVR as a foothold to pivot into internal networks


🧠 Why This Is a Serious Threat

Network-connected surveillance devices often operate outside traditional IT security oversight, making them attractive targets for threat actors seeking initial access.

When compromised, these systems can quietly undermine:

  • Physical security operations

  • Incident investigations

  • Compliance and audit trails

The command injection potential makes CVE-2023-52163 especially valuable for attackers looking to establish persistence or expand laterally across enterprise environments.

CISA’s decision to add this flaw to the KEV catalog confirms that exploitation is not theoretical — it is happening now.


⏱️ Mandatory Action Deadlines

Under Binding Operational Directive (BOD) 22-01, CISA has ordered Federal Civilian Executive Branch (FCEB) agencies to remediate this vulnerability by January 12, 2026.

While this mandate applies directly to federal agencies, private-sector organizations should treat this timeline as a best-practice benchmark.

CISA advises organizations to:

  • Apply vendor-issued patches or mitigations immediately

  • Discontinue use of affected devices if updates are unavailable


🛡️ Recommended Defensive Actions

Organizations running DigiEver DS-2105 Pro systems should act now:

  1. Patch immediately according to DigiEver’s security guidance

  2. Isolate surveillance infrastructure using network segmentation

  3. Monitor device logs for unauthorized commands or configuration changes

  4. Audit access paths between OT/IoT systems and business networks

  5. Treat NVRs and cameras as attack surfaces, not passive hardware

Surveillance systems should never have unrestricted access to internal networks.


🔐 The Elliptic Systems Perspective

This incident highlights a persistent and dangerous trend:
IoT and surveillance devices remain among the weakest links in enterprise security.

Missing authorization flaws are not edge cases — they are design failures, and when exploited, they blur the line between cyber risk and physical risk.

At Elliptic Systems, we help organizations:

  • Assess IoT and OT device exposure

  • Identify exploitable access-control weaknesses

  • Segment and harden surveillance infrastructure

  • Detect active exploitation before attackers move laterally

If your cameras are online, they are part of your threat model.

👉 Schedule an IoT & OT Security Assessment


⚠️ Final Takeaway

CISA’s inclusion of CVE-2023-52163 in the KEV catalog is a clear warning:

If you’re running vulnerable DigiEver NVRs and haven’t patched yet,
you should assume attackers are already scanning for you.

Surveillance devices protect what you see —
but if left unsecured, they expose far more than footage.

Elliptic Systems — Securing the Systems That Watch Over Everything Else.

Ai Consultant | Best-selling Author | Speaker | Innovator | Leading Cybersecurity Expert

Eric Stefanik

Ai Consultant | Best-selling Author | Speaker | Innovator | Leading Cybersecurity Expert

LinkedIn logo icon
Instagram logo icon
Youtube logo icon
Back to Blog