Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11120: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV-VS12

0
Critical
VulnerabilityCVE-2024-11120cvecve-2024-11120cwe-78
Published: Fri Nov 15 2024 (11/15/2024, 02:00:27 UTC)
Source: CVE
Vendor/Project: GeoVision
Product: GV-VS12

Description

Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:52:04 UTC

Technical Analysis

CVE-2024-11120 is an OS Command Injection vulnerability identified in certain end-of-life GeoVision GV-VS12 devices. The root cause is improper neutralization of special elements in operating system commands (CWE-78), which allows unauthenticated remote attackers to inject and execute arbitrary system commands on the affected device. This vulnerability does not require any authentication or user interaction, making it highly exploitable over the network. The CVSS v3.1 base score is 9.8, indicating critical severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The vulnerability affects the confidentiality, integrity, and availability of the device, potentially allowing attackers to take full control, disrupt services, or pivot into internal networks. Although the devices are end-of-life and no patches have been released, reports indicate that exploitation attempts have been observed in the wild. The affected product, GeoVision GV-VS12, is typically used in video surveillance and security monitoring, making the impact significant for organizations relying on these systems for physical security. The lack of patches and the critical nature of the flaw necessitate immediate mitigation steps to prevent compromise.

Potential Impact

For European organizations, the exploitation of CVE-2024-11120 could lead to severe consequences including unauthorized access to surveillance systems, manipulation or deletion of video feeds, disruption of security monitoring, and potential lateral movement into corporate networks. This could compromise physical security, expose sensitive video data, and disrupt operational continuity. Organizations in sectors such as critical infrastructure, government, transportation, and large enterprises that rely on GeoVision GV-VS12 devices for surveillance are particularly vulnerable. The critical severity and ease of exploitation increase the risk of widespread attacks, potentially leading to data breaches, espionage, or sabotage. The unavailability of patches exacerbates the risk, forcing organizations to rely on compensating controls. The impact extends beyond the device itself, as compromised surveillance systems can serve as entry points for broader network intrusions.

Mitigation Recommendations

Given the absence of official patches, European organizations should immediately implement network segmentation to isolate GeoVision GV-VS12 devices from critical networks and sensitive data. Disable all remote access interfaces to these devices, especially those exposed to the internet. Employ strict firewall rules to restrict inbound and outbound traffic to only trusted sources. Monitor network traffic for unusual command execution patterns or unexpected connections originating from these devices. Consider replacing end-of-life GV-VS12 devices with supported, patched alternatives as a long-term solution. If replacement is not immediately feasible, deploy intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting OS command injection patterns. Maintain up-to-date asset inventories to identify all affected devices. Conduct regular security audits and penetration tests focusing on surveillance infrastructure. Finally, educate security teams about this vulnerability to ensure rapid incident response if exploitation is detected.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2024-11-12T06:23:33.571Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd89ac

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 10/21/2025, 7:52:04 PM

Last updated: 12/4/2025, 8:35:30 AM

Views: 31

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats