CVE-2024-45836

6.1 MEDIUM

📋 TL;DR

This cross-site scripting (XSS) vulnerability in PLANEX COMMUNICATIONS network cameras allows attackers to inject malicious scripts into the web management interface. When a logged-in administrator views a specific file, arbitrary JavaScript executes in their browser, potentially compromising camera controls. Only users with web interface access to affected PLANEX cameras are impacted.

💻 Affected Systems

Products:
  • PLANEX COMMUNICATIONS network cameras
Versions: Specific versions not disclosed in JVN advisory; all versions with web management interface are potentially affected
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to the web management interface. The specific vulnerable file is not publicly disclosed.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attacker gains full administrative control of the camera, modifies settings, disables security features, or uses the camera as an internal pivot point for further network attacks.

🟠

Likely Case

Attacker steals administrator session cookies, hijacks the management session, and makes unauthorized configuration changes to the camera.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the camera itself without lateral movement to other systems.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires the attacker to trick an authenticated user into accessing a specific file. No authentication bypass is mentioned.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not available

Vendor Advisory: https://jvn.jp/en/jp/JVN81966868/

Restart Required: No

Instructions:

No official patch available. Contact PLANEX COMMUNICATIONS for firmware updates or mitigation guidance.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate camera management interfaces from untrusted networks and user access

Access Control Restrictions

all

Limit web interface access to trusted administrative IP addresses only

🧯 If You Can't Patch

  • Remove cameras from internet-facing networks immediately
  • Implement strict firewall rules allowing only necessary traffic to camera management interfaces

🔍 How to Verify

Check if Vulnerable:

Check if you have PLANEX COMMUNICATIONS cameras with web management interfaces accessible. No public verification script available.

Check Version:

Check camera web interface → System Information → Firmware Version

Verify Fix Applied:

Contact vendor for firmware updates and verify version against patched releases when available.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to camera web interface
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • HTTP requests to camera management interface containing suspicious script tags or encoded payloads

SIEM Query:

source="camera_logs" AND (url="*specific_vulnerable_file*" OR user_agent="*script*" OR referer="*malicious*"

🔗 References

📤 Share & Export