Skip to main content

CVE-2024-0778: CWE-78 OS Command Injection in Uniview ISC 2500-S

High
VulnerabilityCVE-2024-0778cvecve-2024-0778cwe-78
Published: Mon Jan 22 2024 (01/22/2024, 16:00:06 UTC)
Source: CVE Database V5
Vendor/Project: Uniview
Product: ISC 2500-S

Description

** UNSUPPORTED WHEN ASSIGNED ** A vulnerability, which was classified as critical, has been found in Uniview ISC 2500-S up to 20210930. Affected by this issue is the function setNatConfig of the file /Interface/DevManage/VM.php. The manipulation of the argument natAddress/natPort/natServerPort leads to os command injection. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-251696. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. NOTE: Vendor was contacted early and confirmed immediately that the product is end-of-life. It should be retired and replaced.

AI-Powered Analysis

AILast updated: 07/08/2025, 16:55:37 UTC

Technical Analysis

CVE-2024-0778 is a critical OS command injection vulnerability found in the Uniview ISC 2500-S device, specifically affecting versions up to 20210930. The vulnerability resides in the setNatConfig function within the /Interface/DevManage/VM.php file. It arises from improper sanitization of user-controllable parameters natAddress, natPort, and natServerPort, which are used in constructing OS commands. An attacker with at least low-level privileges (PR:L) and network access (AV:A) can exploit this vulnerability without requiring user interaction (UI:N). Successful exploitation allows the attacker to execute arbitrary OS commands with the privileges of the affected application, potentially leading to full system compromise. The vulnerability has a CVSS v3.1 score of 8.0, indicating high severity with impacts on confidentiality, integrity, and availability. Notably, the affected product is end-of-life and no patches are available, as confirmed by the vendor. The exploit code has been publicly disclosed, increasing the risk of exploitation despite no known active exploitation in the wild at the time of publication. Given the nature of the device (likely a network video recorder or security management system), compromise could lead to unauthorized access to surveillance infrastructure, data exfiltration, or disruption of security monitoring capabilities.

Potential Impact

For European organizations, this vulnerability poses significant risks, especially for entities relying on Uniview ISC 2500-S devices in their physical security infrastructure. Exploitation could lead to unauthorized command execution, allowing attackers to manipulate or disable surveillance systems, access sensitive video feeds, or pivot into internal networks. This could compromise physical security, violate privacy regulations such as GDPR, and disrupt critical operations. The lack of vendor support and patches means organizations must rely on mitigation or replacement strategies. Sectors such as government, critical infrastructure, transportation, and large enterprises with deployed Uniview devices are particularly vulnerable. The potential for lateral movement and data breaches following initial compromise increases the overall threat landscape for European entities.

Mitigation Recommendations

Since the product is end-of-life with no available patches, organizations should prioritize immediate replacement or retirement of affected Uniview ISC 2500-S devices. Until replacement is feasible, implement strict network segmentation to isolate these devices from critical networks and limit access to trusted administrators only. Employ network-level controls such as firewalls and intrusion detection/prevention systems to monitor and block suspicious traffic targeting the vulnerable interface. Disable or restrict access to the setNatConfig function if possible, or remove exposed management interfaces from untrusted networks. Regularly audit device configurations and logs for signs of exploitation attempts. Additionally, consider deploying compensating controls like application-layer gateways or proxies that can sanitize inputs or block malicious payloads. Finally, update organizational asset inventories to identify all affected devices and ensure they are prioritized for decommissioning.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2024-01-22T09:23:35.184Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6839c41d182aa0cae2b435bf

Added to database: 5/30/2025, 2:43:41 PM

Last enriched: 7/8/2025, 4:55:37 PM

Last updated: 8/4/2025, 3:31:47 PM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats