Committed to Security & Reliability

March Networks is committed to ensuring the security and reliability of all of our products. We strive to proactively address security threats as they are reported by the US Computer Emergency Readiness Team (US-CERT). When we learn of potential vulnerabilities, our team conducts immediate, in-depth investigations across our product lines. If appropriate and required, we take immediate action to prepare software/firmware updates, and to alert you to the availability of these updates.

Reporting Security Vulnerabilities to March Networks

If you believe you have identified a security vulnerability in a March Networks product, please contact us immediately at securityalert@marchnetworks.com.

We value the work of independent security researchers who identify vulnerabilities and follow responsible disclosure practices.

Sign up for alerts

Security Advisories

Previous security updates impacting March Networks products are listed below, along with the corresponding software versions in which the vulnerability was addressed. Software updates are posted on our Partner Portal, and can also be found on our Software Downloads page.

If you don’t have access to our partner portal, contact your March Networks certified solution provider for assistance.

CVE(s) Advisory Summary Products or Components Addressed in Release Severity
CVE-2024-6387A Remote Unauthenticated Code Execution (RCE) vulnerability in the OpenSSH server running on Linux-based systems was discovered and verified on a 32-bit Intel-based CPU.8000 NVRs, 9000 NVRs, RideSafe GT/MT/RT NVRsPatch 42339 R1.0 for 5.26.0.0047 (GA) and 5.27.0.0049 (GA)High
CVE-2022-40735, CVE-2002-20001, CVE-2023-48795, CVE-2023-46445, CVE-2023-46446Recently, NIST updated the vulnerabilities CVE-2022-40735 and CVE-2002-20001 to link to an IEEE paper presenting a practical Denial-of-Service attack on the finite field Diffie–Hellman key exchange. The attack is known as DHEat and is rated as a high vulnerability. The SSH service present in R5 recorders allows the use of a Diffie–Hellman key exchange, so there is a risk of a Denial-of-Service attack. We are releasing a patch that correct this, removing Diffie–Hellman key exchange. This patch also corrects CVE-2023-48795, CVE-2023-46445, and CVE-2023-46446, a medium-rated SSH vulnerability known as Terrapin.8000 NVRs, 9000 NVRs, RideSafe GT/MT/RT NVRs5.27.0.0049 (GA)

Patch 42114 R1.0 for 5.25.0.0127 (GA) and 5.26.0.0047 (GA)
High
See the impact section in the advisoryAzul Zulu OpenJDK vulnerabilities on untrusted code and network API. Some security scanners, executed run directly in the server hosting Command Enterprise, detect the Azul version from its configuration files, and list all the potential CVE disclosed in Azul release notes, without checking if the related components are installed or used.Command EnterpriseNo Impact to March Networks productsN/A
CVE-2004-0230Denial of service based on TCP Sequence Number Approximation. Some security scanners, executed run directly in the server hosting Command Enterprise, detect the Azul version from its configuration files, and list all the potential CVE disclosed in Azul release notes, without checking if the related components are installed, or how they are used.See the impact section in the advisoryNo Impact to March Networks productsN/A
CVE-2023-4863libwebp code injection execution in clients running Command ClientCommand ClientCommand Client 2.18.0 and higher, 2.17.2 and 2.16.3Critical
CVE-2020-15778, CVE-2018-15473, CVE-2021-28041, CVE-2021-41617, CVE-2020-14145OpenSSH update to avoid multiple medium security vulnerabilities.8000, 9000 and RideSafe GT/MT/RT seriesPatch available for 5.24.0.0067 (GA) and 5.24.0.1001 (SP1)Medium
N/ASome security scanners show that the HTTP OPTIONS/DELETE methods are enabled, flagging a potential vulnerability without any further check, triggering a false alarm over Command Enterprise.Command EnterpriseNo Impact to March Networks productsN/A
N/AMarch Networks 8000, 9000 and RideSafe Series recorders (R5) allow cameras and encoders to request authentication using weak protocols (NTLMv2 and basic authentication).8000, 9000 and RideSafe Series recordersVisual Intelligence Software Suite 5.24.0.0067High
N/AAn authorized Command Enterprise user could forge a control message over the Command API to modify resource visibility outside of approved access.Command Enterprise2.16.0High
CVE-2022-3786,
CVE-2022-3602
X.509 certificates email address overflows in OpenSSL 3.0.0-3.06. Our products don't use any version of OpenSSL affected by this issue.AllNo Impact to March Networks productsN/A
CVE-2022-22965An attacker may inject remote code execution by exploiting Spring application running on JDK 9 or greater.No Impact to March Networks productsN/A
CVE-2022-23302, CVE-2022-23305, CVE-2022-23307An attacker may inject remote code execution by exploiting Log4j 1.2 components and functions not enabled or used by default: serialization in JMSSink, SQL injections in JDBCAppender, and Apache Chainsaw to view logs with a dedicated GUI-based log viewer.

Command Enterprise versions up to 2.14 use Apache Log4j 1.x without enabling any of the above components and functions. An attacker will need privileged access to Command Enterprise to enable them, so it is not affected by the exploits.

To completely avoid any confusion around these vulnerabilities, and for better future maintenance, in Command Enterprise 2.14.1, we replaced Log4j with Reload4j, a modern alternative to it.
Command Enterprise 2.14.1Low
CVE-2021-45105An attacker may cause a denial of service when a crafted string is interpreted due to uncontrolled recursion from self-referential look-ups.

Command Enterprise uses Apache Log4j 1.x, which is not affected by this vulnerability.
No Impact to March Networks productsN/A
CVE-2021-4104An attacker may exploit Log4j 1.2 configuration, not enabled by default, for a function called JMSAppender. This function may lead to perform JNDI requests, resulting in remote code execution in a similar fashion to CVE-2021-44228.

Command Enterprise uses Apache Log4j 1.x, without enabling JMSAppender. An attacker will already need privileged access to Command Enterprise to exploit it leveraging on this vulnerability.
Command Enterprise 2.14.1Low
N/AAuthentication credentials are printed in clear in the device logs, after their first provisioning. The device serial number can be changed by pushing the configuration with Command Enterprise mass management or using a reserved API.VA Series 1.1.1
ME6 Series 1.1.4
SE2 ATM Camera 1.1.1
SE2 Fleet Wedge Camera 1.1.1
SE2 Fleet Dash Camera 1.1.1
SE2 Flush and Pendant PTZs 30X 1.0.9
ME3 Pendant IR PTZ 40X 1.0.9
SE4 IR DuraBullet 1.0.10
VA Series 1.1.2
ME6 Series 1.1.5
SE2 ATM Camera 1.1.2
SE2 Fleet Wedge Camera 1.1.2
SE2 Fleet Dash Camera 1.1.2
SE2 Flush and Pendant PTZs 30X 1.0.10
ME3 Pendant IR PTZ 40X 1.0.10
SE4 IR DuraBullet 1.0.11
High
CVE-2021-44228An attacker may execute arbitrary code by injecting attacker-controlled data into a message logged with the Apache Log4j2 library versions between 2.0.0 and 2.14.1.

Command Enterprise uses Apache Log4j 1.x, which is not affected by this vulnerability.
No Impact to March Networks productsN/A
N/ASome versions of Admin Console allow basic authentications over HTTP connections towards Command EnterpriseAdmin Console version 5.17, 5.19, 5.20 (including all service packs prior to versions with the fix)5.17 SP3, 5.19 SP3, 5.20 SP2. Versions below 5.17 and above 5.20 are not affectedHigh
N/AVulnerability in Xiaongmai-based devicesNo Impact to March Networks productsN/A
CVE-2019-9163XAML code injection execution in clients running Command ClientCommand ClientCommand Client 2.7.2Critical
CVE-2019-2422Vulnerability in the Java SE component of Oracle Java SENo Impact to March Networks productsN/A
CVE-2019-2426Vulnerability in the Java SE component of Oracle Java SENo Impact to March Networks productsN/A
CVE-2019-2449Vulnerability in the Java SE component of Oracle Java SENo Impact to March Networks productsN/A
CVE-2019-11219iLnkP2pNo Impact to March Networks productsN/A
CVE-2019-11220iLnkP2pNo Impact to March Networks productsN/A
CVE-2018-1149cgi_system in NUUO's NVRMini2 3.8.0No Impact to March Networks productsN/A
CVE-2018-1150NUUO's NVRMini2 3.8.0No Impact to March Networks productsN/A
CVE-2018-10933Libssh Authentication BypassNo Impact to March Networks productsN/A
CVE-2018-11212Vulnerability in the Java SE component of Oracle Java SENo Impact to March Networks productsN/A
CVE-2017-5754Rogue data cache load (Meltdown)Edge OS 2.x Devices;
6000, 8000, 9000, GT, MT Series Recorders & ME4 Series
Not necessary at this timeLow
CVE-2017-5754Rogue data cache load (Meltdown)All of our software that can be
installed on a Windows OS
Microsoft Security Patches onlyMedium
CVE-2017-5753Bounds check bypassEdge OS 2.x Devices;
6000, 8000, 9000, GT, MT Series Recorders;
Edge 4 & Edge 16 Encoders;
ME4 Series
Not necessary at this timeLow
CVE-2017-5753Bounds check bypassAll of our software that can be
installed on a Windows OS
Microsoft Security Patches onlyMedium
CVE-2017-5715Branch target injection (Spectre)Edge OS 2.x Devices;
6000, 8000, 9000, GT, MT Series Recorders;
ME4 Series
Not necessary at this timeLow
CVE-2017-5715Branch target injection (Spectre)All of our software that can be
installed on a Windows OS
Microsoft Security Patches onlyMedium
CVE-2017-9765gSOAPVarious Edge OS 1.x and 2.x DevicesRefer to chartMedium
CVE-2017-5638Apache Struts Jakarta Multipart ParserNo Impact to March Networks productsN/A
CVE-2016-0800Cross-protocol attack on TLS using SSLv2 (DROWN)AllNo Impact to March Networks productsN/A
CVE-2015-1798 CVE-2015-1799NTP MiM/DOS attacksVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.10Medium
N/ASSL Certificate Chain Contains RSA Keys Less Than 2048 bitsVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.10Medium
CVE-2015-2808SSL RC4 Cipher Suites SupportedVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.10Medium
N/ALinux/MooseNo Impact to March Networks productsMedium
CVE-2015-4000Logjam AttackNo Impact to March Networks productsMedium
CVE-2015-0247e2fsprogsVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.9 SP1Medium
CVE-2015-0235GhostVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.9 SP1Medium
CVE-2015-0235GhostVisual Intelligence (R5)
3000 Series
5.5.1 SP18Medium
CVE-2015-0293 and othersOpenSSL 0.9.8zfVisual Intelligence (R5)
3000 Series
5.5.1 SP18High
N/AOpenSSLVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.9Low
N/ANTP UtilitiesVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.9Low
N/AOpen SSHVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.9Low
CVE-2015-0204FREAK SSL/TLS VulnerabilityAllNo Impact to March Networks productsN/A
CVE-2015-0204FREAK SSL/TLS VulnerabilityEdge OS 1.x Devices1.10.6Medium
CVE-2015-0235Linux “Ghost” Remote Code ExecutionVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.9Low
CVE-2015-0160Heartbeat Extension PacketsEdge OS 1.x Devices1.10.4Medium
CVE-2014-2609Oracle GlassFish Server Multiple VulnerabilitiesCommand Enterprise1.8.0Medium
CVE-2014-0224OpenSSL 'ChangeCipherSpec' MiTM VulnerabilityVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.5 - SP1
5.7.7
High
CVE-2014-0224OpenSSL 'ChangeCipherSpec' MiTM VulnerabilityVisual Intelligence (R5)
3204
5.5.1 - SP17High
CVE-2014-0224OpenSSL 'ChangeCipherSpec' MiTM VulnerabilityCommand Recorder1.8.0High
CVE-2014-3566SSL protocol 3.0Edge OS 1.x Devices1.10.6Medium
CVE-2014-0224OpenSSL 'ChangeCipherSpec' MiTM VulnerabilityEdge OS 1.x Devices1.10.6Low
CVE-2014-6271GNU Bash vulnerability causing remote code executionNot applicable to March Networks productsN/A
CVE-2013-5211NTP MONLIST vulnerabilityVisual Intelligence (R5)
8000
4000 (Gen 4)
5.7.2 - SP2
5.7.3 - SP4
5.7.4 - SP3
5.7.8 - SP1
High
CVE-2013-5211NTP MONLIST vulnerability5000 Series4.9.1 - R4 DVRsHigh
CVE-2012-0920Dropbear SSH server vulnerabilityEdge OS 1.x Devices1.10.5Medium