CVE-2024-45170

8.1 HIGH

📋 TL;DR

CVE-2024-45170 is an improper access control vulnerability in za-internet C-MOR Video Surveillance software that allows low-privileged users to perform administrative actions by bypassing client-side restrictions. Attackers can send direct HTTP requests to execute privileged functions like downloading backups or changing configurations. This affects all organizations using vulnerable versions of C-MOR Video Surveillance.

💻 Affected Systems

Products:
  • za-internet C-MOR Video Surveillance
Versions: Version 5.2401 and likely earlier versions
Operating Systems: Linux-based appliance
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with the web interface enabled are vulnerable. The vulnerability exists in the server-side access control logic.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control, download sensitive surveillance footage and backups, modify system configurations to disable security features, and potentially pivot to other systems.

🟠

Likely Case

Unauthorized users access administrative functions to download backup files containing sensitive data, modify surveillance settings, or disrupt monitoring operations.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the C-MOR system itself without lateral movement.

🌐 Internet-Facing: HIGH - Web interface is typically exposed for remote management, making it directly accessible to attackers.
🏢 Internal Only: HIGH - Even internally, any authenticated low-privileged user can escalate to administrative privileges.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires low-privileged credentials but involves simple HTTP request manipulation. Public disclosure includes technical details.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor for latest patched version

Vendor Advisory: https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-024.txt

Restart Required: Yes

Instructions:

1. Check vendor website for security updates. 2. Backup current configuration. 3. Apply the latest security patch. 4. Restart C-MOR services. 5. Verify access controls are properly enforced.

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict access to C-MOR web interface to authorized management networks only

iptables -A INPUT -p tcp --dport 80 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 443 -s TRUSTED_NETWORK -j ACCEPT
iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

User Account Review

all

Review and remove unnecessary low-privileged accounts

Review /etc/passwd and user management interface
Disable unused accounts

🧯 If You Can't Patch

  • Implement strict network access controls to limit who can reach the C-MOR web interface
  • Monitor for unusual administrative actions from non-admin accounts and implement alerting

🔍 How to Verify

Check if Vulnerable:

Test if low-privileged user can access administrative endpoints via direct HTTP requests (e.g., /admin/backup, /admin/config)

Check Version:

Check web interface footer or system information page for version number

Verify Fix Applied:

Verify that low-privileged users receive proper access denied responses when attempting administrative functions

📡 Detection & Monitoring

Log Indicators:

  • Administrative actions from non-admin user accounts
  • Access to /admin/* endpoints from low-privileged users
  • Failed access control checks in application logs

Network Indicators:

  • HTTP requests to administrative endpoints from unexpected source IPs
  • Unusual backup download requests

SIEM Query:

source="c-mor-logs" AND (uri_path="/admin/*" AND user_role!="admin")

🔗 References

📤 Share & Export