CVE-2024-56902

7.5 HIGH

📋 TL;DR

This vulnerability in Geovision GV-ASManager web application versions v6.1.0.0 and earlier allows attackers to access account information including cleartext passwords. It affects organizations using this video surveillance management software for security systems. The information disclosure could lead to complete system compromise.

💻 Affected Systems

Products:
  • Geovision GV-ASManager
Versions: v6.1.0.0 and earlier
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Affects default installations of the web application component. The vulnerability exists in how account information is handled and exposed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative credentials, take full control of surveillance systems, disable security monitoring, access sensitive video footage, and pivot to other network systems.

🟠

Likely Case

Attackers harvest credentials to access the surveillance management interface, potentially viewing or manipulating camera feeds and system settings.

🟢

If Mitigated

With proper network segmentation and access controls, impact is limited to the isolated surveillance network segment.

🌐 Internet-Facing: HIGH - Web application accessible from internet exposes credentials directly to attackers.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to escalate privileges within the surveillance network.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Proof of concept available on GitHub demonstrates information disclosure. Exploitation requires some access to the application but is technically simple.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version newer than v6.1.0.0

Vendor Advisory: Not publicly available

Restart Required: Yes

Instructions:

1. Contact Geovision support for latest version. 2. Backup current configuration. 3. Install updated version. 4. Restart GV-ASManager service. 5. Verify functionality.

🔧 Temporary Workarounds

Network Isolation

all

Restrict access to GV-ASManager web interface to trusted IP addresses only

Configure firewall rules to allow only specific IP ranges to access the GV-ASManager port (default 80/443)

Credential Rotation

all

Change all passwords for GV-ASManager accounts immediately

Log into GV-ASManager admin interface and change all user passwords

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate surveillance systems from production networks
  • Enable comprehensive logging and monitoring for unauthorized access attempts to GV-ASManager

🔍 How to Verify

Check if Vulnerable:

Check GV-ASManager version in application interface or installation directory. Versions v6.1.0.0 or earlier are vulnerable.

Check Version:

Check Help > About in GV-ASManager interface or examine version.txt in installation directory

Verify Fix Applied:

Verify installed version is newer than v6.1.0.0 and test that account information is no longer exposed in cleartext.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to GV-ASManager web interface
  • Multiple failed login attempts followed by successful login from new IP

Network Indicators:

  • Unusual outbound connections from GV-ASManager server
  • Traffic patterns suggesting credential harvesting

SIEM Query:

source="GV-ASManager" AND (event_type="authentication" OR event_type="account_access") | stats count by src_ip, user

🔗 References

📤 Share & Export