CVE-2024-11120: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV-VS12
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
AI Analysis
Technical Summary
CVE-2024-11120 is a critical OS Command Injection vulnerability (CWE-78) affecting certain end-of-life (EOL) GeoVision GV-VS12 devices. This vulnerability allows unauthenticated remote attackers to inject and execute arbitrary system commands on the affected device. The flaw arises from improper neutralization of special elements used in OS commands, enabling attackers to manipulate command inputs and execute malicious payloads at the system level. The vulnerability is particularly severe because it requires no authentication or user interaction, making exploitation straightforward over the network. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can fully compromise the device, potentially gaining control over the system, accessing sensitive data, disrupting services, or using the device as a foothold for further network attacks. Although the affected devices are EOL, reports indicate that exploitation attempts have already been observed in the wild, underscoring the urgency of addressing this issue. No official patches have been released yet, increasing the risk for organizations still operating these devices. The GeoVision GV-VS12 is typically used in video surveillance and security monitoring environments, meaning that compromised devices could lead to significant security breaches, including unauthorized surveillance, data leakage, or disruption of physical security systems.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those relying on GeoVision GV-VS12 devices in their physical security infrastructure. Exploitation could lead to unauthorized access to surveillance feeds, manipulation or deletion of recorded footage, and disruption of security monitoring capabilities. This compromises both physical security and privacy compliance obligations under regulations such as GDPR. Additionally, attackers could leverage compromised devices as entry points into corporate networks, facilitating lateral movement and further cyberattacks. The lack of authentication and ease of exploitation increase the risk of widespread attacks, particularly in sectors with high security requirements such as government, critical infrastructure, transportation, and large enterprises. The EOL status of the devices means that organizations may face challenges in obtaining vendor support or patches, prolonging exposure and complicating incident response efforts.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize immediate risk reduction measures. These include isolating affected GV-VS12 devices on segmented networks with strict access controls to limit exposure to untrusted networks. Employ network-level protections such as firewalls and intrusion detection/prevention systems configured to detect and block suspicious command injection patterns targeting these devices. Organizations should conduct thorough inventories to identify all GV-VS12 devices and assess their exposure. Where possible, replace EOL devices with supported, patched alternatives from GeoVision or other vendors. Implement strict monitoring and logging of device activity to detect anomalous behavior indicative of exploitation attempts. Additionally, restrict management interfaces to trusted IP addresses and disable any unnecessary services or protocols on the devices. If replacement is not immediately feasible, consider deploying virtual patching via network security appliances to mitigate exploitation risks until official fixes become available.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2024-11120: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV-VS12
Description
Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.
AI-Powered Analysis
Technical Analysis
CVE-2024-11120 is a critical OS Command Injection vulnerability (CWE-78) affecting certain end-of-life (EOL) GeoVision GV-VS12 devices. This vulnerability allows unauthenticated remote attackers to inject and execute arbitrary system commands on the affected device. The flaw arises from improper neutralization of special elements used in OS commands, enabling attackers to manipulate command inputs and execute malicious payloads at the system level. The vulnerability is particularly severe because it requires no authentication or user interaction, making exploitation straightforward over the network. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, as attackers can fully compromise the device, potentially gaining control over the system, accessing sensitive data, disrupting services, or using the device as a foothold for further network attacks. Although the affected devices are EOL, reports indicate that exploitation attempts have already been observed in the wild, underscoring the urgency of addressing this issue. No official patches have been released yet, increasing the risk for organizations still operating these devices. The GeoVision GV-VS12 is typically used in video surveillance and security monitoring environments, meaning that compromised devices could lead to significant security breaches, including unauthorized surveillance, data leakage, or disruption of physical security systems.
Potential Impact
For European organizations, the impact of this vulnerability is substantial, especially for those relying on GeoVision GV-VS12 devices in their physical security infrastructure. Exploitation could lead to unauthorized access to surveillance feeds, manipulation or deletion of recorded footage, and disruption of security monitoring capabilities. This compromises both physical security and privacy compliance obligations under regulations such as GDPR. Additionally, attackers could leverage compromised devices as entry points into corporate networks, facilitating lateral movement and further cyberattacks. The lack of authentication and ease of exploitation increase the risk of widespread attacks, particularly in sectors with high security requirements such as government, critical infrastructure, transportation, and large enterprises. The EOL status of the devices means that organizations may face challenges in obtaining vendor support or patches, prolonging exposure and complicating incident response efforts.
Mitigation Recommendations
Given the absence of official patches, European organizations should prioritize immediate risk reduction measures. These include isolating affected GV-VS12 devices on segmented networks with strict access controls to limit exposure to untrusted networks. Employ network-level protections such as firewalls and intrusion detection/prevention systems configured to detect and block suspicious command injection patterns targeting these devices. Organizations should conduct thorough inventories to identify all GV-VS12 devices and assess their exposure. Where possible, replace EOL devices with supported, patched alternatives from GeoVision or other vendors. Implement strict monitoring and logging of device activity to detect anomalous behavior indicative of exploitation attempts. Additionally, restrict management interfaces to trusted IP addresses and disable any unnecessary services or protocols on the devices. If replacement is not immediately feasible, consider deploying virtual patching via network security appliances to mitigate exploitation risks until official fixes become available.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2024-11-12T06:23:33.571Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9819c4522896dcbd89ac
Added to database: 5/21/2025, 9:08:41 AM
Last enriched: 7/5/2025, 7:57:44 AM
Last updated: 7/31/2025, 7:24:47 PM
Views: 12
Related Threats
CVE-2025-9095: Cross Site Scripting in ExpressGateway express-gateway
MediumCVE-2025-7342: CWE-798 Use of Hard-coded Credentials in Kubernetes Image Builder
HighCVE-2025-9094: Improper Neutralization of Special Elements Used in a Template Engine in ThingsBoard
MediumCVE-2025-9093: Improper Export of Android Application Components in BuzzFeed App
MediumCVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.