First published: Tue Sep 17 2024(Updated: )
PTZOptics PT30X-SDI/NDI cameras contain an OS command injection vulnerability that allows a remote, authenticated attacker to escalate privileges to root via a crafted payload with the ntp_addr parameter of the /cgi-bin/param.cgi CGI script.
Credit: disclosure@vulncheck.com disclosure@vulncheck.com
Affected Software | Affected Version | How to fix |
---|---|---|
PTZOptics PT30X-SDI/NDI | ||
All of | ||
PTZOptics PT30X-SDI Firmware | <6.3.40 | |
PTZOptics PT30X-SDI Firmware | ||
All of | ||
PTZOptics PT30X-NDI XX G2 | <6.3.40 | |
PTZOptics PT30X-NDI-XX-G2 Firmware |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-8957 has a high severity due to its ability to allow remote, authenticated attackers to escalate privileges to root.
To fix CVE-2024-8957, update the firmware of PTZOptics PT30X-SDI/NDI cameras to a version higher than 6.3.40.
CVE-2024-8957 affects users of PTZOptics PT30X-SDI and PT30X-NDI cameras running firmware versions up to and including 6.3.40.
CVE-2024-8957 is an OS command injection vulnerability that can be exploited via the ntp_addr parameter in the /cgi-bin/param.cgi CGI script.
Yes, CVE-2024-8957 can be exploited remotely by authenticated attackers.