CVE-2024-32758

7.5 HIGH

📋 TL;DR

CVE-2024-32758 is a cryptographic weakness in exacqVision video management systems where client-server communication uses insufficient key length during key exchange, potentially allowing attackers to decrypt or manipulate surveillance data. This affects organizations using exacqVision Client and Server software for security monitoring. The vulnerability stems from inadequate encryption strength in certain communication scenarios.

💻 Affected Systems

Products:
  • exacqVision Client
  • exacqVision Server
Versions: Specific versions not detailed in advisory; check Johnson Controls advisory for exact affected versions
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability occurs 'under certain circumstances' during client-server communication; all default installations should be considered vulnerable until patched.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could decrypt live surveillance feeds, manipulate video evidence, inject false footage, or disrupt security monitoring operations, potentially enabling physical security breaches.

🟠

Likely Case

Eavesdropping on surveillance communications, decrypting recorded footage, or disrupting video streams in targeted attacks against vulnerable systems.

🟢

If Mitigated

Limited impact with proper network segmentation and monitoring, though encrypted communications remain theoretically vulnerable to cryptanalysis.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires network access to client-server communications and cryptographic analysis capabilities; no public exploits known at advisory publication.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Johnson Controls advisory for specific patched versions

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Review Johnson Controls security advisory ICSA-24-214-01. 2. Download and apply the latest exacqVision updates from official sources. 3. Restart both exacqVision Server and Client services. 4. Verify communication uses proper encryption.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate exacqVision systems from untrusted networks to limit attack surface

VPN Tunnel Enforcement

all

Require all client-server communications to use VPN with strong encryption

🧯 If You Can't Patch

  • Segment exacqVision network completely from internet and untrusted internal networks
  • Implement network monitoring for unusual traffic patterns between exacqVision components

🔍 How to Verify

Check if Vulnerable:

Check exacqVision version against Johnson Controls advisory; monitor network traffic for weak encryption handshakes

Check Version:

In exacqVision Client/Server interface: Help → About or check installed program version

Verify Fix Applied:

Verify updated version is installed; use network analysis tools to confirm proper key exchange length

📡 Detection & Monitoring

Log Indicators:

  • Failed encryption handshakes
  • Unusual connection patterns between clients and servers

Network Indicators:

  • Short key exchange packets
  • Unencrypted or weakly encrypted video streams

SIEM Query:

source="exacqvision" AND (event_type="connection_error" OR protocol="weak_crypto")

🔗 References

📤 Share & Export