CVE-2024-11120

9.8 CRITICAL

📋 TL;DR

This CVE describes an OS command injection vulnerability in certain end-of-life GeoVision devices that allows unauthenticated remote attackers to execute arbitrary system commands. The vulnerability is actively being exploited in the wild to compromise devices and incorporate them into botnets. Organizations using affected GeoVision devices are at immediate risk.

💻 Affected Systems

Products:
  • GeoVision video surveillance devices
Versions: Specific EOL models (exact models not specified in references)
Operating Systems: Embedded Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are end-of-life (EOL) and no longer supported by the vendor. Exact affected models should be identified through vendor documentation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to data exfiltration, lateral movement within networks, persistent backdoor installation, and device enrollment in botnets for DDoS attacks or cryptomining.

🟠

Likely Case

Device compromise and enrollment in Mirai-based botnets for DDoS attacks, with potential for credential theft and network reconnaissance.

🟢

If Mitigated

Limited impact if devices are properly segmented and monitored, though exploitation attempts may still cause service disruption.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Active exploitation observed in the wild with Mirai botnet variants targeting vulnerable devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: https://www.twcert.org.tw/en/cp-139-8237-26d7a-2.html

Restart Required: No

Instructions:

No official patch available as devices are EOL. Immediate decommissioning and replacement with supported devices is recommended.

🔧 Temporary Workarounds

Network Segmentation and Isolation

all

Isolate affected devices in separate network segments with strict firewall rules to prevent external access.

Access Control Restrictions

all

Implement strict network access controls to limit device exposure to only necessary management networks.

🧯 If You Can't Patch

  • Immediately disconnect affected devices from the internet and critical networks
  • Replace EOL devices with supported alternatives as soon as possible

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against known affected EOL GeoVision devices. Monitor for unexpected network connections or process execution.

Check Version:

Check device web interface or console for firmware version information (specific command varies by model).

Verify Fix Applied:

Verify devices are either decommissioned or properly segmented with no external internet access.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected command execution in system logs
  • Unusual process creation
  • Failed authentication attempts followed by command execution

Network Indicators:

  • Outbound connections to known botnet C2 servers
  • Unusual port scanning activity from device
  • Sudden spikes in network traffic

SIEM Query:

source="device_logs" AND (process="sh" OR process="bash") AND command="*;*" OR command="*|*" OR command="*`*"

🔗 References

📤 Share & Export