CVE-2024-32864

6.4 MEDIUM

📋 TL;DR

CVE-2024-32864 is a security misconfiguration vulnerability in exacqVision Web Services where HTTPS enforcement fails under certain circumstances, allowing cleartext HTTP communication. This affects organizations using Johnson Controls exacqVision video management systems, potentially exposing sensitive video surveillance data and credentials.

💻 Affected Systems

Products:
  • Johnson Controls exacqVision
Versions: Specific versions not detailed in advisory; check vendor advisory for exact affected versions
Operating Systems: Windows, Linux (exacqVision Server)
Default Config Vulnerable: ⚠️ Yes
Notes: Affects exacqVision Web Services component; requires specific circumstances where HTTPS enforcement fails (exact trigger conditions not publicly detailed).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers intercept sensitive video surveillance footage, credentials, and system data in transit, leading to privacy violations, operational disruption, and potential physical security compromise.

🟠

Likely Case

Man-in-the-middle attacks capturing administrative credentials and video streams, enabling unauthorized access to surveillance systems and sensitive areas.

🟢

If Mitigated

Limited exposure with proper network segmentation and monitoring, but still potential for credential harvesting if HTTPS isn't enforced.

🌐 Internet-Facing: HIGH - Internet-facing systems could have all web traffic intercepted without encryption.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could still intercept unencrypted traffic on the network.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires network access to intercept traffic; no authentication needed to observe unencrypted traffic when HTTPS enforcement fails.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Johnson Controls advisory for specific patched versions

Vendor Advisory: https://www.johnsoncontrols.com/trust-center/cybersecurity/security-advisories

Restart Required: Yes

Instructions:

1. Review Johnson Controls advisory for affected versions. 2. Apply vendor-provided patches. 3. Restart exacqVision services. 4. Verify HTTPS enforcement is working.

🔧 Temporary Workarounds

Force HTTPS via Network Controls

all

Configure network devices to redirect all HTTP traffic to HTTPS or block HTTP access to exacqVision web services

Network Segmentation

all

Isolate exacqVision systems to trusted network segments with strict access controls

🧯 If You Can't Patch

  • Implement strict network segmentation and firewall rules to limit access to exacqVision systems
  • Deploy network monitoring and IDS/IPS to detect cleartext traffic interception attempts

🔍 How to Verify

Check if Vulnerable:

Attempt HTTP access to exacqVision web interface; if it loads without redirecting to HTTPS, system may be vulnerable. Monitor network traffic for cleartext HTTP sessions.

Check Version:

Check exacqVision Server version in web interface under Help > About or server administration console

Verify Fix Applied:

Verify all web access requires HTTPS and HTTP requests are redirected or blocked. Check version against patched releases in vendor advisory.

📡 Detection & Monitoring

Log Indicators:

  • HTTP access logs showing cleartext connections to exacqVision web services
  • Failed HTTPS redirect attempts

Network Indicators:

  • Cleartext HTTP traffic to exacqVision web ports (typically 80/8080)
  • Lack of TLS/SSL encryption on web traffic

SIEM Query:

source_ip="exacqvision_server" AND (protocol="HTTP" OR port=80 OR port=8080) AND NOT protocol="HTTPS"

🔗 References

📤 Share & Export