Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-42531: n/a

0
Critical
VulnerabilityCVE-2024-42531cvecve-2024-42531
Published: Fri Aug 23 2024 (08/23/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-42531 is a critical vulnerability affecting the Ezviz Internet PT Camera CS-CV246 model, allowing unauthenticated remote attackers to access live video streams by sending specially crafted RTSP packets with specific URLs. The vulnerability enables an attacker to redirect the camera feed without requiring authentication or user interaction, posing severe risks to confidentiality, integrity, and availability. Although the vendor disputes the risk by stating that sample exploit code can establish RTSP communication but cannot obtain video or audio data, the CVSS score of 9. 8 indicates a high likelihood of full exploitation. No patches are currently available, and no known exploits have been observed in the wild. Organizations using these cameras should treat this vulnerability as critical and implement immediate mitigations to prevent unauthorized access. The threat primarily affects regions where Ezviz cameras are widely deployed, including the United States, China, European Union countries, Japan, South Korea, and Australia. Due to the nature of the vulnerability and the critical CVSS rating, this issue demands urgent attention from security teams managing IoT and surveillance infrastructure.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:18:13 UTC

Technical Analysis

CVE-2024-42531 is a critical security vulnerability identified in the Ezviz Internet PT Camera model CS-CV246 (D15655150). The flaw arises from improper validation and handling of RTSP (Real Time Streaming Protocol) requests, allowing an unauthenticated remote attacker to craft a series of RTSP packets with specific URLs that can redirect the camera's live video stream. This vulnerability is classified under CWE-20 (Improper Input Validation), indicating that the camera firmware does not adequately verify or sanitize incoming RTSP requests. Exploitation requires no authentication or user interaction, making it highly accessible to attackers on the same network or potentially over the internet if the device is exposed. The CVSS v3.1 score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) reflects the critical nature of this vulnerability, highlighting its network attack vector, low attack complexity, no privileges or user interaction required, and full impact on confidentiality, integrity, and availability. Despite the vendor's claim that the publicly available sample exploit code (Anonymous120386) can establish RTSP communication but cannot retrieve video or audio data, this assertion has not been independently verified, and the high CVSS score suggests the potential for severe exploitation. No official patches or firmware updates have been released at the time of publication, and no known active exploitation has been reported. This vulnerability poses a significant risk to privacy and security, as unauthorized access to live video streams can lead to surveillance, espionage, or further network compromise.

Potential Impact

The impact of CVE-2024-42531 is substantial for organizations and individuals using the Ezviz CS-CV246 PT cameras. Unauthorized access to live video streams compromises confidentiality, exposing sensitive visual information and potentially private environments. Integrity is at risk because attackers could redirect or manipulate the video feed, undermining trust in surveillance data. Availability could also be affected if attackers disrupt or hijack the camera streams. For enterprises relying on these cameras for security monitoring, this vulnerability could enable attackers to bypass physical security controls, conduct espionage, or gather intelligence for further attacks. The lack of authentication and user interaction requirements lowers the barrier for exploitation, increasing the likelihood of attacks, especially in environments where cameras are internet-facing or poorly segmented. The absence of patches means organizations must rely on network-level controls and mitigations to reduce exposure. Privacy regulations in many jurisdictions could also lead to legal and compliance ramifications if unauthorized video access occurs. Overall, the vulnerability threatens operational security, privacy, and regulatory compliance for affected users worldwide.

Mitigation Recommendations

Given the absence of official patches, organizations should implement immediate compensating controls to mitigate CVE-2024-42531. First, restrict network access to the affected cameras by placing them behind firewalls or network segmentation, limiting RTSP traffic only to trusted management networks. Disable or block RTSP protocol access from untrusted or external networks to prevent remote exploitation. Change default credentials and ensure strong authentication mechanisms are in place for device management interfaces, even though this vulnerability does not require authentication, to reduce overall attack surface. Monitor network traffic for unusual RTSP requests or patterns indicative of exploitation attempts. If possible, disable RTSP streaming on the device until a vendor patch is available. Regularly check for firmware updates from Ezviz and apply them promptly once released. Consider replacing vulnerable devices with models that have a stronger security posture if mitigation is not feasible. Additionally, implement intrusion detection systems (IDS) or intrusion prevention systems (IPS) tuned to detect anomalous RTSP traffic. Maintain comprehensive logging and alerting to detect potential exploitation attempts early. Finally, educate staff about the risks of exposed IoT devices and enforce strict policies on device exposure to the internet.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-05T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cc1b7ef31ef0b568d3f

Added to database: 2/25/2026, 9:42:25 PM

Last enriched: 2/26/2026, 7:18:13 AM

Last updated: 2/26/2026, 8:03:24 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats