INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h Global phishing Multiple sectors HIGH 1h Global insider Cybersecurity Services CRITICAL 1h Global ransomware Multiple sectors (U.S. companies) CRITICAL 1h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 2h Global general Cybersecurity Operations HIGH 3h Global phishing Technology and Consumer Services HIGH 3h Global data_breach Multiple sectors HIGH 3h
Vulnerabilities

CVE-2020-5735

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability — Amcrest cameras and NVR contain a stack-based buffer overflow vulnerability through port 37777 that allows an unauthenticated, remot
Published: Nov 3, 2021  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Amcrest Cameras and NVR Stack-based Buffer Overflow Vulnerability — Amcrest cameras and NVR contain a stack-based buffer overflow vulnerability through port 37777 that allows an unauthenticated, remote attacker to crash the device and possibly execute code.

🤖 AI Executive Summary

CVE-2020-5735 is a critical stack-based buffer overflow vulnerability in Amcrest cameras and NVR devices accessible via port 37777, allowing unauthenticated remote attackers to crash devices or execute arbitrary code. With a CVSS score of 9.0 and publicly available exploits, this poses an immediate threat to surveillance infrastructure across Saudi organizations. Patching is urgent as affected devices are commonly deployed in banking, government, and critical infrastructure facilities.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 19, 2026 11:49
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses severe risk to Saudi critical infrastructure sectors: (1) Banking & Financial Services (SAMA-regulated) — surveillance systems in branches and data centers; (2) Government & Defense (NCA oversight) — security monitoring in federal facilities; (3) Energy Sector (ARAMCO, SEC) — surveillance in oil/gas facilities and power plants; (4) Healthcare — hospital security and patient monitoring systems; (5) Telecommunications (STC, Mobily) — network operations centers and facility monitoring; (6) Transportation & Logistics — port and airport surveillance systems. Unauthenticated remote code execution on surveillance infrastructure could enable facility breaches, data theft, or physical security compromise.
🏢 Affected Saudi Sectors
Banking & Financial Services Government & Defense Energy & Utilities Healthcare Telecommunications Transportation & Logistics Critical Infrastructure
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all Amcrest cameras and NVR devices in your network using port scanning (nmap -p 37777 <network>)
2. Isolate affected devices from internet-facing networks immediately
3. Restrict access to port 37777 via firewall rules — allow only authorized management IPs
4. Disable port 37777 if remote access is not required

PATCHING:
5. Check Amcrest security advisories for firmware updates specific to your device model
6. Apply available patches immediately following vendor guidance
7. Test patches in non-production environment first
8. Document patch deployment with timestamps

COMPENSATING CONTROLS (if patch unavailable):
9. Implement network segmentation — place NVR/cameras on isolated VLAN
10. Deploy WAF/IPS rules to detect buffer overflow attempts on port 37777
11. Enable authentication and change default credentials
12. Monitor port 37777 for suspicious connection patterns

DETECTION:
13. IDS/IPS Signature: Monitor for oversized payloads to port 37777
14. Log Analysis: Alert on failed authentication attempts to port 37777
15. Network Monitoring: Baseline normal traffic patterns and alert on anomalies
16. Endpoint Detection: Monitor for unexpected process execution on NVR devices
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. حدد جميع أجهزة كاميرات Amcrest و NVR في شبكتك باستخدام فحص المنافذ (nmap -p 37777 <network>)
2. عزل الأجهزة المتأثرة عن الشبكات المتصلة بالإنترنت فوراً
3. تقييد الوصول إلى المنفذ 37777 عبر قواعد جدار الحماية — السماح فقط بعناوين IP الإدارة المصرح بها
4. تعطيل المنفذ 37777 إذا لم يكن الوصول البعيد مطلوباً

التصحيح:
5. تحقق من استشارات أمان Amcrest للحصول على تحديثات البرامج الثابتة الخاصة بطراز جهازك
6. طبق التصحيحات المتاحة فوراً وفقاً لإرشادات البائع
7. اختبر التصحيحات في بيئة غير الإنتاج أولاً
8. وثق نشر التصحيح مع الطوابع الزمنية

الضوابط البديلة (إذا لم يكن التصحيح متاحاً):
9. تنفيذ تقسيم الشبكة — ضع NVR/الكاميرات على VLAN معزول
10. نشر قواعد WAF/IPS للكشف عن محاولات تجاوز المخزن المؤقت على المنفذ 37777
11. تفعيل المصادقة وتغيير بيانات الاعتماد الافتراضية
12. مراقبة المنفذ 37777 للكشف عن أنماط الاتصال المريبة

الكشف:
13. توقيع IDS/IPS: مراقبة الحمولات الكبيرة إلى المنفذ 37777
14. تحليل السجل: تنبيه محاولات المصادقة الفاشلة إلى المنفذ 37777
15. مراقبة الشبكة: خط أساس أنماط حركة المرور العادية والتنبيه على الشذوذ
16. كشف نقطة النهاية: مراقبة تنفيذ العملية غير المتوقعة على أجهزة NVR
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.6.1 — Access Control (unauthenticated remote access) ECC 2024 A.12.2 — Malware Protection (code execution risk) ECC 2024 A.12.6 — Management of Technical Vulnerabilities ECC 2024 A.13.1 — Network Security (port 37777 exposure)
🔵 SAMA CSF
SAMA CSF ID.BE-1 — Asset Management (surveillance infrastructure inventory) SAMA CSF PR.AC-1 — Access Control (unauthenticated access) SAMA CSF PR.PT-1 — Protection Processes (vulnerability management) SAMA CSF DE.CM-1 — Detection & Analysis (anomaly detection)
🟡 ISO 27001:2022
ISO 27001:2022 A.5.15 — Access Control (authentication) ISO 27001:2022 A.8.1 — Cryptography (secure communications) ISO 27001:2022 A.8.2 — Physical & Environmental Security (surveillance systems) ISO 27001:2022 A.12.2 — Vulnerability Management (patch management)
🟣 PCI DSS v4.0
PCI DSS 6.2 — Security Patches (timely patching requirement) PCI DSS 1.3 — Firewall Configuration (port 37777 restriction) PCI DSS 2.1 — Default Credentials (change defaults on NVR)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Amcrest:Cameras and Network Video Recorder (NVR)
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS61.63%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-05-03
Published 2021-11-03
Source Feed cisa_kev
Views 3
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.