Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-11120: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV-VS12

0
Critical
VulnerabilityCVE-2024-11120cvecve-2024-11120cwe-78
Published: Fri Nov 15 2024 (11/15/2024, 02:00:27 UTC)
Source: CVE
Vendor/Project: GeoVision
Product: GV-VS12

Description

Certain EOL GeoVision devices have an OS Command Injection vulnerability. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device. Moreover, this vulnerability has already been exploited by attackers, and we have received related reports.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/28/2026, 11:24:53 UTC

Technical Analysis

CVE-2024-11120 is a critical vulnerability identified in certain end-of-life GeoVision GV-VS12 devices, which are typically used for video surveillance and security management. The vulnerability is classified as CWE-78, indicating improper neutralization of special elements used in OS commands, commonly known as OS Command Injection. This flaw allows unauthenticated remote attackers to inject arbitrary system commands directly into the device's operating system command interface. Because the vulnerability requires no authentication or user interaction, it can be exploited remotely over the network, making it highly dangerous. The CVSS v3.1 base score of 9.8 reflects the ease of exploitation (attack vector network, low attack complexity), and the severe impact on confidentiality, integrity, and availability of the device and potentially the broader network it is connected to. The vulnerability affects devices that are end-of-life, meaning no official patches or firmware updates are currently available from the vendor. Reports indicate that attackers have already exploited this vulnerability in the wild, underscoring the urgency of mitigation. The root cause lies in insufficient input validation or sanitization of user-supplied data that is passed to OS commands, allowing attackers to execute arbitrary commands with the privileges of the vulnerable service. This can lead to full device compromise, data exfiltration, disruption of surveillance operations, or pivoting to other network assets.

Potential Impact

The impact of CVE-2024-11120 is severe for organizations relying on GeoVision GV-VS12 devices for surveillance and security. Successful exploitation can lead to complete compromise of the affected device, allowing attackers to execute arbitrary commands, manipulate or disable surveillance feeds, exfiltrate sensitive video data, or use the device as a foothold for lateral movement within the network. This threatens the confidentiality and integrity of surveillance data and the availability of security monitoring systems. In critical infrastructure, government, or enterprise environments, such compromise could undermine physical security and operational safety. The lack of authentication requirement and remote exploitability significantly increases the attack surface and risk. Since the devices are end-of-life, organizations may face challenges in obtaining vendor support or patches, prolonging exposure. Additionally, attackers exploiting this vulnerability could launch further attacks, including ransomware or espionage campaigns, leveraging the compromised device as a beachhead.

Mitigation Recommendations

Given the absence of official patches for this end-of-life device, organizations should take immediate and specific mitigation steps: 1) Isolate affected GV-VS12 devices on segmented networks with strict access controls to limit exposure to untrusted networks. 2) Employ network-level protections such as firewalls and intrusion prevention systems (IPS) to block unauthorized access to device management interfaces. 3) Disable any unnecessary services or remote management features on the devices to reduce attack vectors. 4) Monitor network traffic and device logs for suspicious command execution or anomalous behavior indicative of exploitation attempts. 5) Where feasible, replace end-of-life GV-VS12 devices with supported, patched alternatives from the vendor or other trusted manufacturers. 6) Implement strict network segmentation between surveillance devices and critical IT infrastructure to prevent lateral movement. 7) Conduct regular security assessments and penetration testing focused on IoT and surveillance devices to identify and remediate similar risks. 8) Maintain up-to-date asset inventories to ensure all vulnerable devices are identified and managed appropriately.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2024-11-12T06:23:33.571Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd89ac

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 2/28/2026, 11:24:53 AM

Last updated: 3/25/2026, 7:08:49 PM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses