Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42531: n/a

0
Critical
VulnerabilityCVE-2024-42531cvecve-2024-42531
Published: Fri Aug 23 2024 (08/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

Ezviz Internet PT Camera CS-CV246 D15655150 allows an unauthenticated host to access its live video stream by crafting a set of RTSP packets with a specific set of URLs that can be used to redirect the camera feed. NOTE: the vendor's perspective is that the Anonymous120386 sample code can establish RTSP protocol communictaion, but cannot obtain video or audio data; thus, there is no risk.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 07:18:13 UTC

Technical Analysis

CVE-2024-42531 is a critical security vulnerability identified in the Ezviz Internet PT Camera model CS-CV246 (D15655150). The flaw arises from improper validation and handling of RTSP (Real Time Streaming Protocol) requests, allowing an unauthenticated remote attacker to craft a series of RTSP packets with specific URLs that can redirect the camera's live video stream. This vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the camera firmware does not adequately verify or sanitize incoming RTSP requests. Exploitation requires no authentication or user interaction, making it highly accessible to attackers on the same network or potentially over the internet if the device is exposed. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Despite the vendor's claim that the publicly available sample exploit code (Anonymous120386) can establish RTSP communication but cannot retrieve video or audio data, this assertion has not been independently verified, and the high CVSS score suggests the potential for severe exploitation. No official patches or firmware updates have been released at the time of publication, and no known active exploitation has been reported. This vulnerability poses a significant risk to privacy and security, as unauthorized access to live video streams can lead to surveillance, espionage, or further network compromise.

Potential Impact

The impact of CVE-2024-42531 is substantial for organizations and individuals using the Ezviz CS-CV246 PT cameras. Unauthorized access to live video streams compromises confidentiality, exposing sensitive visual information and potentially private environments. Integrity is at risk because attackers could redirect or manipulate the video feed, undermining trust in surveillance data. Availability could also be affected if attackers disrupt or hijack the camera streams. For enterprises relying on these cameras for security monitoring, this vulnerability could enable attackers to bypass physical security controls, conduct espionage, or gather intelligence for further attacks. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks, especially in environments where cameras are internet-facing or poorly segmented. The absence of patches means organizations must rely on network-level controls and mitigations to reduce exposure. Privacy regulations in many jurisdictions could also lead to legal and compliance ramifications if unauthorized video access occurs. Overall, the vulnerability threatens operational security, privacy, and regulatory compliance for affected users worldwide.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls to mitigate CVE-2024-42531. First, restrict network access to the affected cameras by placing them behind firewalls or network segmentation, limiting RTSP traffic only to trusted management networks. Disable or block RTSP protocol access from untrusted or external networks to prevent remote exploitation. Change default credentials and ensure strong authentication mechanisms are in place for device management interfaces, even though this vulnerability does not require authentication, to reduce overall attack surface. Monitor network traffic for unusual RTSP requests or patterns indicative of exploitation attempts. If possible, disable RTSP streaming on the device until a vendor patch is available. Regularly check for firmware updates from Ezviz and apply them promptly once released. Consider replacing vulnerable devices with models that have a stronger security posture if mitigation is not feasible. Additionally, implement intrusion detection systems (IDS) or intrusion prevention systems (IPS) tuned to detect anomalous RTSP traffic. Maintain comprehensive logging and alerting to detect potential exploitation attempts early. Finally, educate staff about the risks of exposed IoT devices and enforce strict policies on device exposure to the internet.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc1b7ef31ef0b568d3f

Added to database: 2/25/2026, 9:42:25 PM

Last enriched: 2/26/2026, 7:18:13 AM

Last updated: 4/12/2026, 3:42:41 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses