Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-31798: n/a

0
Medium
VulnerabilityCVE-2024-31798cvecve-2024-31798
Published: Thu Aug 15 2024 (08/15/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Identical Hardcoded Root Password for All Devices in GNCC's GC2 Indoor Security Camera 1080P allows an attacker with physical access to retrieve the root password for all similar devices

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 12:29:36 UTC

Technical Analysis

CVE-2024-31798 identifies a security vulnerability in GNCC's GC2 Indoor Security Camera 1080P model, where the root password is hardcoded and identical across all devices. This design flaw violates best practices for credential management, specifically CWE-259 (Use of Hard-coded Password). Because the root password is the same for every device, an attacker who gains physical access to any one camera can retrieve this password and use it to access the root account on all similar devices. The vulnerability does not require network access or user interaction but does require physical access, which limits remote exploitation but still poses a significant risk in environments where devices are accessible. The CVSS v3.1 score of 6.4 reflects a medium severity, with attack vector being physical (AV:P), high attack complexity (AC:H), no privileges required (PR:N), no user interaction (UI:N), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No patches or firmware updates have been published yet, and no known exploits are currently in the wild. This vulnerability can lead to full device compromise, enabling attackers to manipulate camera functions, disable security features, or use the device as a foothold for further network intrusion.

Potential Impact

The impact of this vulnerability is significant for organizations deploying GNCC GC2 Indoor Security Cameras, especially in sensitive environments such as corporate offices, government facilities, or critical infrastructure sites. An attacker with physical access can gain root privileges, compromising device confidentiality by accessing video feeds and stored data, integrity by altering device configurations or firmware, and availability by disabling or damaging the device. This could lead to unauthorized surveillance, privacy violations, and potential lateral movement within the network if the camera is connected to internal systems. The uniformity of the hardcoded password means that compromise of one device endangers all similar devices, increasing the risk of widespread exploitation. Although remote exploitation is not feasible without physical access, insider threats or attackers with temporary physical access pose a real danger. The absence of patches or mitigations increases the urgency for organizations to implement compensating controls.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first enhance physical security controls to restrict unauthorized access to the cameras. This includes securing installation locations, using tamper-evident seals, and monitoring physical access. Until a vendor patch or firmware update is available, administrators should consider isolating these cameras on segmented networks with strict access controls to limit potential lateral movement. If possible, replace affected devices with models that do not use hardcoded credentials or allow password customization. Regularly audit device configurations and logs for signs of tampering. Engage with the vendor to request firmware updates or security advisories. Additionally, implement network-level protections such as firewall rules and intrusion detection systems to monitor unusual traffic from these devices. Educate staff about the risks of physical device compromise and enforce policies to prevent unauthorized handling of security cameras.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-04-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6dd5b7ef31ef0b58f0f5

Added to database: 2/25/2026, 9:47:01 PM

Last enriched: 2/26/2026, 12:29:36 PM

Last updated: 4/11/2026, 7:02:47 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses