CVE-2024-0778: CWE-78 OS Command Injection in Uniview ISC 2500-S
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in Uniview ISC 2500-S up to 20210930. Affected by this issue is the function setNatConfig of the file /Interface/DevManage/VM.php. The manipulation of the argument natAddress/natPort/natServerPort leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251696. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI Analysis
Technical Summary
CVE-2024-0778 is a critical OS command injection vulnerability found in the Uniview ISC 2500-S device, specifically affecting versions up to 20210930. The vulnerability resides in the setNatConfig function within the /Interface/DevManage/VM.php file. It arises from improper sanitization of user-controllable parameters natAddress, natPort, and natServerPort, which are used in constructing OS commands. An attacker with at least low-level privileges (PR:L) and network access (AV:A) can exploit this vulnerability without requiring user interaction (UI:N). Successful exploitation allows the attacker to execute arbitrary OS commands with the privileges of the affected application, potentially leading to full system compromise. The vulnerability has a CVSS v3.1 score of 8.0, indicating high severity with impacts on confidentiality, integrity, and availability. Notably, the affected product is end-of-life and no patches are available, as confirmed by the vendor. The exploit code has been publicly disclosed, increasing the risk of exploitation despite no known active exploitation in the wild at the time of publication. Given the nature of the device (likely a network video recorder or security management system), compromise could lead to unauthorized access to surveillance infrastructure, data exfiltration, or disruption of security monitoring capabilities.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for entities relying on Uniview ISC 2500-S devices in their physical security infrastructure. Exploitation could lead to unauthorized command execution, allowing attackers to manipulate or disable surveillance systems, access sensitive video feeds, or pivot into internal networks. This could compromise physical security, violate privacy regulations such as GDPR, and disrupt critical operations. The lack of vendor support and patches means organizations must rely on mitigation or replacement strategies. Sectors such as government, critical infrastructure, transportation, and large enterprises with deployed Uniview devices are particularly vulnerable. The potential for lateral movement and data breaches following initial compromise increases the overall threat landscape for European entities.
Mitigation Recommendations
Since the product is end-of-life with no available patches, organizations should prioritize immediate replacement or retirement of affected Uniview ISC 2500-S devices. Until replacement is feasible, implement strict network segmentation to isolate these devices from critical networks and limit access to trusted administrators only. Employ network-level controls such as firewalls and intrusion detection/prevention systems to monitor and block suspicious traffic targeting the vulnerable interface. Disable or restrict access to the setNatConfig function if possible, or remove exposed management interfaces from untrusted networks. Regularly audit device configurations and logs for signs of exploitation attempts. Additionally, consider deploying compensating controls like application-layer gateways or proxies that can sanitize inputs or block malicious payloads. Finally, update organizational asset inventories to identify all affected devices and ensure they are prioritized for decommissioning.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Belgium, Sweden, Austria
CVE-2024-0778: CWE-78 OS Command Injection in Uniview ISC 2500-S
Description
** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in Uniview ISC 2500-S up to 20210930. Affected by this issue is the function setNatConfig of the file /Interface/DevManage/VM.php. The manipulation of the argument natAddress/natPort/natServerPort leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251696. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.
AI-Powered Analysis
Technical Analysis
CVE-2024-0778 is a critical OS command injection vulnerability found in the Uniview ISC 2500-S device, specifically affecting versions up to 20210930. The vulnerability resides in the setNatConfig function within the /Interface/DevManage/VM.php file. It arises from improper sanitization of user-controllable parameters natAddress, natPort, and natServerPort, which are used in constructing OS commands. An attacker with at least low-level privileges (PR:L) and network access (AV:A) can exploit this vulnerability without requiring user interaction (UI:N). Successful exploitation allows the attacker to execute arbitrary OS commands with the privileges of the affected application, potentially leading to full system compromise. The vulnerability has a CVSS v3.1 score of 8.0, indicating high severity with impacts on confidentiality, integrity, and availability. Notably, the affected product is end-of-life and no patches are available, as confirmed by the vendor. The exploit code has been publicly disclosed, increasing the risk of exploitation despite no known active exploitation in the wild at the time of publication. Given the nature of the device (likely a network video recorder or security management system), compromise could lead to unauthorized access to surveillance infrastructure, data exfiltration, or disruption of security monitoring capabilities.
Potential Impact
For European organizations, this vulnerability poses significant risks, especially for entities relying on Uniview ISC 2500-S devices in their physical security infrastructure. Exploitation could lead to unauthorized command execution, allowing attackers to manipulate or disable surveillance systems, access sensitive video feeds, or pivot into internal networks. This could compromise physical security, violate privacy regulations such as GDPR, and disrupt critical operations. The lack of vendor support and patches means organizations must rely on mitigation or replacement strategies. Sectors such as government, critical infrastructure, transportation, and large enterprises with deployed Uniview devices are particularly vulnerable. The potential for lateral movement and data breaches following initial compromise increases the overall threat landscape for European entities.
Mitigation Recommendations
Since the product is end-of-life with no available patches, organizations should prioritize immediate replacement or retirement of affected Uniview ISC 2500-S devices. Until replacement is feasible, implement strict network segmentation to isolate these devices from critical networks and limit access to trusted administrators only. Employ network-level controls such as firewalls and intrusion detection/prevention systems to monitor and block suspicious traffic targeting the vulnerable interface. Disable or restrict access to the setNatConfig function if possible, or remove exposed management interfaces from untrusted networks. Regularly audit device configurations and logs for signs of exploitation attempts. Additionally, consider deploying compensating controls like application-layer gateways or proxies that can sanitize inputs or block malicious payloads. Finally, update organizational asset inventories to identify all affected devices and ensure they are prioritized for decommissioning.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2024-01-22T09:23:35.184Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6839c41d182aa0cae2b435bf
Added to database: 5/30/2025, 2:43:41 PM
Last enriched: 7/8/2025, 4:55:37 PM
Last updated: 8/4/2025, 3:31:47 PM
Views: 11
Related Threats
CVE-2025-8988: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8987: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-8986: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumCVE-2025-31987: CWE-405 Asymmetric Resource Consumption in HCL Software Connections Docs
MediumCVE-2025-8985: SQL Injection in SourceCodester COVID 19 Testing Management System
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.