CVE-2024-45172
📋 TL;DR
CVE-2024-45172 is a cross-site request forgery (CSRF) vulnerability in za-internet C-MOR Video Surveillance web interface that allows attackers to trick authenticated users into performing unintended actions. This affects administrators and users of C-MOR Video Surveillance systems who access the web interface while authenticated. Attackers can exploit this to modify system settings, add/delete users, or change surveillance configurations without the victim's knowledge.
💻 Affected Systems
- za-internet C-MOR Video Surveillance
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete system compromise where attackers can reconfigure surveillance settings, disable monitoring, add backdoor accounts, or delete critical footage and user accounts.
Likely Case
Unauthorized configuration changes, user account manipulation, or surveillance system disruption through crafted requests that authenticated users unknowingly execute.
If Mitigated
Limited impact with proper CSRF protections, network segmentation, and strict access controls preventing successful exploitation.
🎯 Exploit Status
CSRF attacks are well-understood and easy to implement. Exploitation requires the victim to be authenticated and visit a malicious page while logged into C-MOR.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Not available
Vendor Advisory: Not provided in references
Restart Required: No
Instructions:
No official patch available. Monitor vendor website for updates and apply immediately when released.
🔧 Temporary Workarounds
Implement CSRF Tokens
allAdd anti-CSRF tokens to all state-changing requests in the web application
Requires application code modification - consult developer documentation
SameSite Cookie Attribute
allSet SameSite=Strict or SameSite=Lax attributes on session cookies
Set-Cookie: sessionid=xxx; SameSite=Strict; Secure; HttpOnly
🧯 If You Can't Patch
- Network segmentation: Isolate C-MOR systems from general user networks and restrict web interface access to trusted IPs only
- User awareness: Train users to log out of C-MOR when not actively using it and avoid browsing untrusted websites while authenticated
🔍 How to Verify
Check if Vulnerable:
Test web interface forms for missing CSRF tokens by inspecting HTTP requests for anti-CSRF mechanisms
Check Version:
Check C-MOR web interface footer or about page for version information (typically displays 5.2401 or 6.00PL01)
Verify Fix Applied:
Verify all POST/PUT/DELETE requests include unique, validated CSRF tokens that cannot be predicted
📡 Detection & Monitoring
Log Indicators:
- Multiple configuration changes from same user in short timeframe
- Unexpected user account modifications
- Configuration changes from unusual user agents or referrers
Network Indicators:
- HTTP requests to C-MOR interface with missing or predictable CSRF tokens
- Requests originating from unexpected referrer domains
SIEM Query:
source="c-mor-logs" AND (action="config_change" OR action="user_modify") | stats count by src_ip, user, action