First published: Mon Jun 17 2024(Updated: )
Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
GeoVision Multiple Devices | ||
GeoVision Multiple Devices | ||
All of | ||
Geovision Gv-dsp Lpr Firmware | ||
Geovision Gv-dsp Lpr Firmware | =2.0 | |
All of | ||
Geovision Gv Ipcamd Gv Bx130 Firmware | ||
Geovision Gv Ipcamd Gv Bx130 Firmware | ||
All of | ||
Geovision Gv Ipcamd Gv Bx1500 | ||
Geovision Gv Ipcamd Gv Bx1500 Firmware | ||
All of | ||
Geovision GV-IPCAMD GV-CB220 Firmware | ||
Geovision GV-IPCAMD GV-CB220 Firmware | ||
All of | ||
Geovision Gv Ebl1100 | ||
Geovision Gv Ebl1100 | ||
All of | ||
Geovision Gv Ipcamd Gv Efd1100 Firmware | ||
Geovision Gv Ipcamd Gv Efd1100 | ||
All of | ||
Geovision GV-IPCAMD GV-FD2410 Firmware | ||
Geovision GV-IPCAMD GV-FD2410 Firmware | ||
All of | ||
Geovision Gv Ipcamd Gv Fd3400 | ||
Geovision Gv Ipcamd Gv Fd3400 Firmware | ||
All of | ||
Geovision Gv Ipcamd Gv Fe3401 Firmware | ||
Geovision Gv Ipcamd Gv Fe3401 | ||
All of | ||
Geovision Gv Ipcamd Gv Fe420 Firmware | ||
Geovision Gv Ipcamd Gv Fe420 Firmware | ||
All of | ||
Geovision Gv Gm8186 Vs14 | ||
Geovision Gv Gm8186 Vs14 Firmware | ||
All of | ||
Geovision Gv-vs14 Vs14 Firmware | ||
Geovision Gv Gm8186 Vs14 | ||
All of | ||
Geovision Gv VS03 | ||
Geovision Gv Vs03 Firmware | ||
All of | ||
Geovision Gv Vs2410 Firmware | ||
Geovision Gv Vs2410 Firmware | ||
Geovision Gv Vs28xx Firmware | ||
All of | ||
Geovision Gv Vs216xx Firmware | ||
Geovision Gv Vs216xx | ||
All of | ||
Geovision Gv Vs04a Firmware | ||
Geovision GV-VS04A | ||
All of | ||
Geovision Gv Vs04h | ||
Geovision Gv Vs04h Firmware | ||
All of | ||
Geovision GVLX 4 | ||
Any of | ||
Geovision GVLX 4 Firmware | =2.0 | |
Geovision GVLX 4 Firmware | =3.0 |
All affected products are no longer in surport. Please retire or replace them.
Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-6047 has been classified as a high severity vulnerability due to the potential for unauthenticated remote code execution.
To mitigate CVE-2024-6047, update your GeoVision EOL device to the latest firmware version that addresses this vulnerability.
The CVE-2024-6047 vulnerability affects certain end-of-life (EOL) GeoVision devices that do not properly filter user inputs.
CVE-2024-6047 allows unauthenticated remote attackers to inject and execute arbitrary system commands on the affected GeoVision devices.
No, CVE-2024-6047 can be exploited by attackers without authentication, making it particularly dangerous.