CVE-2024-6047

9.8 CRITICAL

📋 TL;DR

This vulnerability allows unauthenticated remote attackers to execute arbitrary system commands on affected GeoVision devices due to improper input filtering. It affects end-of-life (EOL) GeoVision products, primarily used in surveillance and security systems. Attackers can fully compromise vulnerable devices without any authentication.

💻 Affected Systems

Products:
  • GeoVision end-of-life devices
Versions: Specific EOL versions (exact range not specified in references)
Operating Systems: Embedded/Linux-based systems
Default Config Vulnerable: ⚠️ Yes
Notes: Devices are end-of-life with no official vendor support. Exact models not specified but likely include various surveillance/IP camera products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device takeover leading to botnet recruitment, data exfiltration, lateral movement into internal networks, and persistent backdoor installation.

🟠

Likely Case

Device compromise for Mirai-like botnet recruitment, DDoS participation, and credential theft from connected systems.

🟢

If Mitigated

Limited impact if devices are isolated behind firewalls with strict network controls and no internet exposure.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Actively exploited in the wild for Mirai botnet recruitment. No authentication required makes exploitation trivial.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: N/A

Vendor Advisory: N/A

Restart Required: No

Instructions:

No official patch available as devices are end-of-life. Consider workarounds or replacement.

🔧 Temporary Workarounds

Network Isolation

linux

Isolate affected devices from internet and restrict network access

iptables -A INPUT -s 0.0.0.0/0 -j DROP # Block all external access
iptables -A OUTPUT -d 0.0.0.0/0 -j DROP # Block all outgoing traffic

Access Control Lists

linux

Implement strict firewall rules to limit device communication

# Configure firewall to only allow necessary IPs/ports
iptables -A INPUT -s trusted_ip -p tcp --dport device_port -j ACCEPT

🧯 If You Can't Patch

  • Immediately disconnect from internet and place behind strict firewall
  • Replace with supported devices that receive security updates

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version against known EOL GeoVision products. Monitor for unexpected network connections or processes.

Check Version:

Check device web interface or console for firmware version information

Verify Fix Applied:

Verify devices are no longer internet-accessible and network traffic is restricted to authorized sources only.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process execution
  • Unauthorized configuration changes
  • Failed authentication attempts from unknown sources

Network Indicators:

  • Outbound connections to known C2 servers
  • Unusual port scanning from device
  • DDoS traffic originating from device

SIEM Query:

source_ip=geo_vision_device AND (destination_port=23 OR destination_port=2323 OR protocol="telnet")

🔗 References

📤 Share & Export