First published: Fri Nov 15 2024(Updated: )
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
Geovision Gv-vs12 Firmware | ||
Geovision Gv-vs12 Firmware | ||
All of | ||
Geovision Gv-vs11 Firmware | ||
Geovision Gv-vs11 Firmware | ||
All of | ||
Geovision Gv-dsp Lpr Firmware | ||
Geovision Gv-dsp Lpr Firmware | =3.0 | |
All of | ||
Geovision GVLX 4 | ||
Geovision GVLX 4 Firmware | =2.0 | |
All of | ||
Geovision GVLX 4 | ||
Geovision GVLX 4 Firmware | =3.0 | |
GeoVision Multiple Devices |
The affected devices are no longer being maintained. It is recommended to replace them.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-11120 is classified as a high severity vulnerability due to its potential for unauthenticated remote command execution.
To fix CVE-2024-11120, update affected GeoVision devices to the latest firmware version provided by the manufacturer.
CVE-2024-11120 affects certain EOL (end-of-life) GeoVision devices, including models GV-VS11, GV-VS12, and GV-DSP LPR.
Yes, CVE-2024-11120 can be exploited remotely by unauthenticated attackers to execute arbitrary system commands.
Yes, CVE-2024-11120 has been reported to have already been exploited by attackers to install malware.