Skip to main content

CVE-2024-0643: CWE-434 Unrestricted Upload of File with Dangerous Type in Cires21 C21 Live Encoder and Live Mosaic

Critical
VulnerabilityCVE-2024-0643cvecve-2024-0643cwe-434
Published: Wed Jan 17 2024 (01/17/2024, 13:44:19 UTC)
Source: CVE Database V5
Vendor/Project: Cires21
Product: C21 Live Encoder and Live Mosaic

Description

Unrestricted upload of dangerous file types in the C21 Live Encoder and Live Mosaic product, version 5.3. This vulnerability allows a remote attacker to upload different file extensions without any restrictions, resulting in a full system compromise.

AI-Powered Analysis

AILast updated: 07/03/2025, 16:42:37 UTC

Technical Analysis

CVE-2024-0643 is a critical vulnerability identified in the C21 Live Encoder and Live Mosaic products, version 5.3, developed by Cires21. The vulnerability is classified under CWE-434, which pertains to the unrestricted upload of files with dangerous types. Specifically, this flaw allows a remote attacker to upload files with arbitrary extensions without any validation or restriction. Because the product fails to properly restrict or sanitize uploaded file types, an attacker can upload malicious files such as web shells, scripts, or executables. This can lead to full system compromise, including unauthorized code execution, data theft, or disruption of service. The CVSS v3.1 base score is 10.0, indicating a critical severity level, with an attack vector of network (AV:N), no required privileges (PR:N), no user interaction (UI:N), and scope change (S:C). The impact on confidentiality, integrity, and availability is high (C:H/I:H/A:H). The vulnerability is exploitable remotely without authentication or user interaction, making it highly dangerous. Although no public exploits have been reported yet, the ease of exploitation and critical impact make it a significant threat. The lack of available patches at the time of publication further increases risk for affected users. This vulnerability affects media encoding and streaming infrastructure, which are often integral to broadcasting, live event streaming, and content delivery networks.

Potential Impact

For European organizations, the impact of CVE-2024-0643 can be severe, especially for entities relying on C21 Live Encoder and Live Mosaic products for live video encoding and streaming services. Compromise of these systems could lead to unauthorized access to sensitive media content, disruption of live broadcasts, and potential lateral movement within corporate networks. This could damage the reputation of media companies, broadcasters, and event organizers, resulting in financial losses and regulatory scrutiny under GDPR if personal data is exposed. Additionally, attackers could leverage compromised encoding infrastructure to distribute malicious content or conduct further attacks against viewers or connected systems. The critical nature of this vulnerability means that organizations using these products must treat it as an urgent security risk, as exploitation could lead to full system takeover without any user interaction or authentication barriers.

Mitigation Recommendations

Immediate mitigation steps include isolating affected systems from untrusted networks to reduce exposure. Organizations should implement strict network segmentation and firewall rules to limit access to the encoding devices. Since no patches are currently available, consider disabling or restricting the file upload functionality where possible. Employ application-layer filtering or proxy solutions to inspect and block uploads of dangerous file types. Monitor logs and network traffic for unusual upload activity or signs of exploitation attempts. Engage with the vendor, Cires21, to obtain updates on patch availability and apply security updates as soon as they are released. Additionally, conduct a thorough security review of the deployment environment, including privilege management and access controls, to minimize the impact of a potential compromise. Implementing intrusion detection systems (IDS) and endpoint detection and response (EDR) solutions can help identify and respond to exploitation attempts quickly.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
INCIBE
Date Reserved
2024-01-17T10:35:34.863Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 683dbfa6182aa0cae249830a

Added to database: 6/2/2025, 3:13:42 PM

Last enriched: 7/3/2025, 4:42:37 PM

Last updated: 8/15/2025, 6:22:09 AM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats