March Networks is committed to ensuring the security and reliability of all of our products. We strive to proactively address security threats as they are reported by the US Computer Emergency Readiness Team (US-CERT). When we learn of potential vulnerabilities, our team conducts immediate, in-depth investigations across our product lines. If appropriate and required, we take immediate action to prepare software/firmware updates, and to alert you to the availability of these updates.
Security Advisories
Previous security updates impacting March Networks products are listed below, along with the corresponding software versions in which the vulnerability was addressed. Software updates are posted on our partner portal, and can also be found on our Software Downloads page.
If you don’t have access to our partner portal, contact your March Networks certified solution provider for assistance.
Important: No Impact from Xiongmai/Telnet vulnerability
March Networks' products do not contain Xiongmai software and March Networks does not utilize the Telnet service in any way. Additionally, March Networks conducts independent third-party penetration testing on our 8000, 9000 and RideSafe Series Recorders. This testing confirmed no IP-based direct or indirect network communications, nor any routing or redirecting of data traffic that could be used to permit visibility into user data, exfiltrate data, metadata or infer any data from any of our recorders.
Stay up to date with email alerts.
Sign up for alertsReporting Security Vulnerabilities to March Networks
If you believe you have identified a security vulnerability in a March Networks product, please contact us immediately at securityalert@marchnetworks.com.
We value the work of independent security researchers who identify vulnerabilities and follow responsible disclosure practices.
Security Advisories
CVE | Advisory Summary | Products or Components | Addressed in Release | Severity |
---|---|---|---|---|
N/A | Vulnerability in Xiaongmai-based devices | None | No Impact to March Networks products | N/A |
CVE-2019-9163 | XAML code injection execution in clients running Command Client | Command Client | Command Client 2.7.2 | Critical |
CVE-2019-2422 | Vulnerability in the Java SE component of Oracle Java SE | None | No Impact to March Networks products | N/A |
CVE-2019-2426 | Vulnerability in the Java SE component of Oracle Java SE | None | No Impact to March Networks products | N/A |
CVE-2019-2449 | Vulnerability in the Java SE component of Oracle Java SE | None | No Impact to March Networks products | N/A |
CVE-2019-11219 | iLnkP2p | None | No Impact to March Networks products | N/A |
CVE-2019-11220 | iLnkP2p | None | No Impact to March Networks products | N/A |
CVE-2018-1149 | cgi_system in NUUO's NVRMini2 3.8.0 | None | No Impact to March Networks products | N/A |
CVE-2018-1150 | NUUO's NVRMini2 3.8.0 | None | No Impact to March Networks products | N/A |
CVE-2018-10933 | Libssh Authentication Bypass | None | No Impact to March Networks products | N/A |
CVE-2018-11212 | Vulnerability in the Java SE component of Oracle Java SE | None | No Impact to March Networks products | N/A |
CVE-2017-5754 | Rogue data cache load (Meltdown) | 6000, 8000, 9000, GT, MT Series Recorders; ME4 Series & Edge OS 2.x Devices (including Edge 4 & Edge 16 Encoders) |
Not necessary at this time | Low |
CVE-2017-5754 | Rogue data cache load (Meltdown) | All of our software that can be installed on a Windows OS |
Microsoft Security Patches only | Medium |
CVE-2017-5753 | Bounds check bypass | 6000, 8000, 9000, GT, MT Series Recorders; Edge 4 & Edge 16 Encoders; ME4 Series & Edge OS 2.x Devices (including Edge 4 & Edge 16 Encoders) |
Not necessary at this time | Low |
CVE-2017-5753 | Bounds check bypass | All of our software that can be installed on a Windows OS |
Microsoft Security Patches only | Medium |
CVE-2017-5715 | Branch target injection (Spectre) | 6000, 8000, 9000, GT, MT Series Recorders; ME4 Series & Edge OS 2.x Devices (including Edge 4 & Edge 16 Encoders) |
Not necessary at this time | Low |
CVE-2017-5715 | Branch target injection (Spectre) | All of our software that can be installed on a Windows OS |
Microsoft Security Patches only | Medium |
CVE-2017-9765 | gSOAP | Various Edge OS 1.x and 2.x Devices | Refer to chart | Medium |
CVE-2017-5638 | Apache Struts Jakarta Multipart Parser | N/A | No Impact to March Networks products | N/A |
CVE-2016-0800 | Cross-protocol attack on TLS using SSLv2 (DROWN) | All | No Impact to March Networks products | N/A |
CVE-2015-1798 CVE-2015-1799 |
NTP MiM/DOS attacks | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.10 | Medium |
N/A | SSL Certificate Chain Contains RSA Keys Less Than 2048 bits | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.10 | Medium |
CVE-2015-2808 | SSL RC4 Cipher Suites Supported | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.10 | Medium |
N/A | Linux/Moose | N/A | No Impact to March Networks products | Medium |
CVE-2015-4000 | Logjam Attack | N/A | No Impact to March Networks products | Medium |
CVE-2015-0247 | e2fsprogs | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.9 SP1 | Medium |
CVE-2015-0235 | Ghost | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.9 SP1 | Medium |
CVE-2015-0235 | Ghost | Visual Intelligence (R5) 3000 Series |
5.5.1 SP18 | Medium |
CVE-2015-0293 and others |
OpenSSL 0.9.8zf | Visual Intelligence (R5) 3000 Series |
5.5.1 SP18 | High |
N/A | OpenSSL | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.9 | Low |
N/A | NTP Utilities | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.9 | Low |
N/A | Open SSH | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.9 | Low |
CVE-2015-0204 | FREAK SSL/TLS Vulnerability | All | No Impact to March Networks products | N/A |
CVE-2015-0204 | FREAK SSL/TLS Vulnerability | Edge OS 1.x Devices | 1.10.6 | Medium |
CVE-2015-0235 | Linux “Ghost” Remote Code Execution | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.9 | Low |
CVE-2015-0160 | Heartbeat Extension Packets | Edge OS 1.x Devices | 1.10.4 | Medium |
CVE-2014-2609 | Oracle GlassFish Server Multiple Vulnerabilities | Command Enterprise | 1.8.0 | Medium |
CVE-2014-0224 | OpenSSL 'ChangeCipherSpec' MiTM Vulnerability | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.5 - SP1 5.7.7 |
High |
CVE-2014-0224 | OpenSSL 'ChangeCipherSpec' MiTM Vulnerability | Visual Intelligence (R5) 3204 |
5.5.1 - SP17 | High |
CVE-2014-0224 | OpenSSL 'ChangeCipherSpec' MiTM Vulnerability | Command Recorder | 1.8.0 | High |
CVE-2014-3566 | SSL protocol 3.0 | Edge OS 1.x Devices | 1.10.6 | Medium |
CVE-2014-0224 | OpenSSL 'ChangeCipherSpec' MiTM Vulnerability | Edge OS 1.x Devices | 1.10.6 | Low |
CVE-2014-6271 | GNU Bash vulnerability causing remote code execution | None | Not applicable to March Networks products | N/A |
CVE-2013-5211 | NTP MONLIST vulnerability | Visual Intelligence (R5) 8000 4000 (Gen 4) |
5.7.2 - SP2 5.7.3 - SP4 5.7.4 - SP3 5.7.8 - SP1 |
High |
CVE-2013-5211 | NTP MONLIST vulnerability | 5000 Series | 4.9.1 - R4 DVRs | High |
CVE-2012-0920 | Dropbear SSH server vulnerability | Edge OS 1.x Devices | 1.10.5 | Medium |