CVE-2026-34005

Xiongmai · Sofia on DVR/NVR (AHB7008T-MH-V2 and NBD7024H-P)

A critical vulnerability exists in the Sofia component of Xiongmai DVR/NVR devices. This flaw allows attackers to potentially compromise the surveillance system's integrity and availability.

Executive summary

Xiongmai DVR and NVR devices utilizing the Sofia component are subject to a high-severity vulnerability that could lead to unauthorized system access or control.

Vulnerability

The Sofia service, commonly used for remote management and video streaming on Xiongmai hardware, contains a flaw that may permit remote exploitation. Based on the technical context, an attacker could potentially interact with the service at a low authentication level to disrupt operations.

Business impact

A successful exploit could result in the total compromise of physical security infrastructure, allowing unauthorized parties to view, delete, or manipulate surveillance footage. The CVSS score of 8.8 reflects a high severity, indicating that the vulnerability could lead to significant operational downtime and a loss of data confidentiality. Organizations relying on these devices for premises security face substantial reputational and physical risk.

Remediation

Immediate Action: Administrators should immediately apply the latest firmware updates provided by Xiongmai or their respective OEM providers to patch the Sofia service.

Proactive Monitoring: Monitor network traffic for unusual connections to ports associated with DVR management and review system logs for unauthorized login attempts or configuration changes.

Compensating Controls: Isolate DVR/NVR hardware on a dedicated VLAN with no direct internet exposure and implement strict Access Control Lists (ACLs) to limit management access to trusted IP addresses.

Exploitation status

Public Exploit Available: false

Analyst recommendation

The high CVSS score of 8.8 necessitates an immediate response to prevent unauthorized access to sensitive surveillance environments. Security teams must prioritize firmware deployment and network isolation to mitigate the risk of remote compromise.