
13/12/2024

16/12/2024

27/2/2025
CVE-2024-12553: GeoVision GV-ASManager Missing Authorization Information Disclosure Vulnerability
First published: Fri Dec 13 2024(Updated: )
GeoVision GV-ASManager Missing Authorization Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of GeoVision GV-ASManager. Although authentication is required to exploit this vulnerability, default guest credentials may be used.
The specific flaw exists within the GV-ASWeb service. The issue results from the lack of authorization prior to allowing access to functionality. An attacker can leverage this vulnerability to disclose stored credentials, leading to further compromise. Was ZDI-CAN-25394.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|
GeoVision | | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2024-12553?
CVE-2024-12553 has been rated as a high severity vulnerability due to its potential to disclose sensitive information.
How do I fix CVE-2024-12553?
To remediate CVE-2024-12553, you should apply the latest security patches provided by GeoVision for GV-ASManager.
What types of information can be disclosed by exploiting CVE-2024-12553?
Exploiting CVE-2024-12553 can lead to unauthorized disclosure of sensitive information stored within GV-ASManager.
Is authentication required to exploit CVE-2024-12553?
Yes, authentication is required to exploit CVE-2024-12553, although it may still allow attackers to access sensitive information post-authentication.
Who is affected by CVE-2024-12553?
CVE-2024-12553 affects installations of GeoVision GV-ASManager that are not properly secured.
- agent/title
- agent/weakness
- agent/references
- agent/type
- agent/first-publish-date
- agent/description
- agent/softwarecombine
- collector/nvd-api
- source/NVD
- agent/severity
- agent/author
- agent/event
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/trending
- agent/source
- agent/tags
- collector/zdi-advisory
- source/ZDI
- alias/ZDI-24-1682
- alias/ZDI-CAN-25394
- alias/CVE-2024-12553
- agent/software-canonical-lookup
- agent/software-canonical-lookup-request
- vendor/geovision
- canonical/geovision
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203