CVE-2024-52545

6.5 MEDIUM

📋 TL;DR

An unauthenticated attacker can exploit an out-of-bounds heap read vulnerability in the IQ Service (TCP port 9876) on Lorex 2K Indoor Wi-Fi Security Cameras. This allows reading memory contents without authentication, potentially exposing sensitive information. All users with affected camera models running vulnerable firmware are impacted.

💻 Affected Systems

Products:
  • Lorex 2K Indoor Wi-Fi Security Camera
Versions: All versions before 2.800.0000000.8.R.20241111
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: The IQ Service runs by default on TCP port 9876. No special configuration is required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure leading to credential theft, device compromise, or lateral movement within the network.

🟠

Likely Case

Memory leak exposing device information, configuration data, or partial credentials.

🟢

If Mitigated

Limited information exposure with no direct code execution path.

🌐 Internet-Facing: HIGH - The service runs on TCP port 9876 and is accessible without authentication, making internet-exposed devices prime targets.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this to gather information about the device and network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit code is available on GitHub. The vulnerability requires no authentication and has straightforward exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.800.0000000.8.R.20241111

Vendor Advisory: https://www.rapid7.com/blog/post/2024/12/03/lorex-2k-indoor-wi-fi-security-camera-multiple-vulnerabilities-fixed/

Restart Required: Yes

Instructions:

1. Log into the camera's web interface. 2. Navigate to firmware update section. 3. Upload firmware version 2.800.0000000.8.R.20241111. 4. Apply the update and restart the camera.

🔧 Temporary Workarounds

Block IQ Service Port

linux

Block access to TCP port 9876 at network perimeter or host firewall

iptables -A INPUT -p tcp --dport 9876 -j DROP

Network Segmentation

all

Isolate cameras on separate VLAN without internet access

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate cameras from untrusted networks
  • Deploy intrusion detection rules to monitor for exploitation attempts on port 9876

🔍 How to Verify

Check if Vulnerable:

Check if TCP port 9876 is open and accessible. Test with the public exploit PoC if in a controlled environment.

Check Version:

Check camera web interface under Settings > System > Firmware Version

Verify Fix Applied:

Verify firmware version is 2.800.0000000.8.R.20241111 or later. Test that port 9876 no longer responds to exploitation attempts.

📡 Detection & Monitoring

Log Indicators:

  • Unusual connections to TCP port 9876
  • Memory access errors in system logs

Network Indicators:

  • Traffic to/from port 9876 from unexpected sources
  • Patterns matching exploit payloads

SIEM Query:

source_port=9876 OR dest_port=9876 | stats count by src_ip, dest_ip

🔗 References

📤 Share & Export