INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 44m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 44m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 34m Global insider Cybersecurity Services CRITICAL 44m Global ransomware Multiple sectors (U.S. companies) CRITICAL 57m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2022-23227

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
NUUO NVRmini2 Devices Missing Authentication Vulnerability — NUUO NVRmini2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR ar
Published: Dec 18, 2024  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

NUUO NVRmini2 Devices Missing Authentication Vulnerability — NUUO NVRmini2 devices contain a missing authentication vulnerability that allows an unauthenticated attacker to upload an encrypted TAR archive, which can be abused to add arbitrary users.

🤖 AI Executive Summary

NUUO NVRmini2 network video recorders contain a critical authentication bypass vulnerability (CVSS 9.0) allowing unauthenticated attackers to upload malicious encrypted TAR archives and create arbitrary administrative users. This vulnerability poses severe risk to surveillance infrastructure across Saudi organizations, with active exploits available. Immediate patching is essential for all deployed NVRmini2 devices.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 21, 2026 15:34
🇸🇦 Saudi Arabia Impact Assessment
Critical impact on Saudi government facilities, banking security operations, healthcare surveillance systems, and ARAMCO/energy sector infrastructure. High-risk for NCA facilities, SAMA banking centers, and critical national infrastructure. Attackers can gain full administrative control of surveillance systems, enabling unauthorized access to sensitive facilities, data theft, and system manipulation. Particularly concerning for border security, airport surveillance, and government building access control systems.
🏢 Affected Saudi Sectors
Government Banking Healthcare Energy/Oil & Gas Telecommunications Transportation Critical Infrastructure Border Security Airport Operations
⚖️ Saudi Risk Score (AI)
9.2
/ 10.0
🔧 Remediation Steps (English)
IMMEDIATE ACTIONS:
1. Identify all NUUO NVRmini2 devices in your network using asset inventory and network scanning
2. Isolate affected devices from internet-facing access immediately
3. Restrict network access to NVRmini2 devices to authorized personnel only via firewall rules
4. Change all default credentials and administrative passwords
5. Review access logs for unauthorized user creation or suspicious uploads

PATCHING:
1. Contact NUUO support for latest firmware patches addressing CVE-2022-23227
2. Test patches in isolated lab environment before production deployment
3. Schedule maintenance windows for firmware updates on all affected devices
4. Verify patch installation and confirm vulnerability remediation

COMPENSATING CONTROLS (if patching delayed):
1. Implement network segmentation - place NVRmini2 on isolated VLAN
2. Deploy WAF/IPS rules to block suspicious TAR archive uploads
3. Enable detailed logging and monitoring of all device access
4. Implement IP whitelisting for device management access
5. Monitor for unauthorized user account creation attempts

DETECTION:
1. Monitor for HTTP POST requests to upload endpoints without authentication
2. Alert on TAR file uploads to NVRmini2 devices
3. Track new user account creation on NVRmini2 systems
4. Monitor for privilege escalation attempts on surveillance systems
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة NUUO NVRmini2 في شبكتك باستخدام جرد الأصول والفحص الشبكي
2. عزل الأجهزة المتأثرة عن الوصول المتصل بالإنترنت فوراً
3. تقييد الوصول الشبكي إلى أجهزة NVRmini2 للموظفين المصرح لهم فقط عبر قواعد جدار الحماية
4. تغيير جميع بيانات الاعتماد الافتراضية وكلمات مرور المسؤول
5. مراجعة سجلات الوصول للبحث عن إنشاء مستخدمين غير مصرح به أو تحميلات مريبة

التصحيح:
1. الاتصال بدعم NUUO للحصول على أحدث تصحيحات البرامج الثابتة
2. اختبار التصحيحات في بيئة معملية معزولة قبل النشر الإنتاجي
3. جدولة نوافذ الصيانة لتحديثات البرامج الثابتة على جميع الأجهزة المتأثرة
4. التحقق من تثبيت التصحيح وتأكيد معالجة الثغرة

الضوابط البديلة (إذا تأخر التصحيح):
1. تنفيذ تقسيم الشبكة - ضع NVRmini2 على VLAN معزول
2. نشر قواعد WAF/IPS لحظر تحميلات أرشيفات TAR المريبة
3. تفعيل السجلات التفصيلية ومراقبة جميع الوصول إلى الجهاز
4. تنفيذ القائمة البيضاء للعناوين IP لوصول إدارة الجهاز
5. مراقبة محاولات إنشاء حسابات مستخدمين غير مصرح به

الكشف:
1. مراقبة طلبات HTTP POST إلى نقاط النهاية بدون مصادقة
2. تنبيه عند تحميل ملفات TAR إلى أجهزة NVRmini2
3. تتبع إنشاء حسابات مستخدمين جديدة على أنظمة NVRmini2
4. مراقبة محاولات تصعيد الامتيازات على أنظمة المراقبة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2024 A.5.1.1 - Access Control Policies ECC 2024 A.5.2.1 - User Registration and Access Rights Management ECC 2024 A.5.3.1 - Password Management ECC 2024 A.8.1.1 - Audit Logging and Monitoring ECC 2024 A.12.4.1 - Event Logging
🔵 SAMA CSF
ID.AM-2 - Asset Management PR.AC-1 - Access Control Policy PR.AC-4 - Access Rights Management DE.CM-1 - Detection and Analysis DE.AE-1 - Anomalies and Events
🟡 ISO 27001:2022
A.5.1.1 - Policies for information security A.5.2.1 - Information security responsibilities A.5.3.1 - Segregation of duties A.6.2.1 - Mobile device and teleworking A.8.1.1 - User endpoint devices A.8.2.1 - Privileged access rights A.8.3.1 - Information access restriction A.8.3.4 - Access control to information A.12.4.1 - Event logging
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
NUUO:NVRmini2 Devices
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS46.99%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2025-01-08
Published 2024-12-18
Source Feed cisa_kev
Views 1
🇸🇦 Saudi Risk Score
9.2
/ 10.0 — Saudi Risk
Priority: CRITICAL
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.