CVE-2024-45172: n/a
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 and 6.00PL01. Due to missing protection mechanisms, the C-MOR web interface is vulnerable to cross-site request forgery (CSRF) attacks. The C-MOR web interface offers no protection against cross-site request forgery (CSRF) attacks.
AI Analysis
Technical Summary
CVE-2024-45172 identifies a cross-site request forgery (CSRF) vulnerability in the za-internet C-MOR Video Surveillance system, specifically versions 5.2401 and 6.00PL01. The root cause is the lack of CSRF protection mechanisms in the web interface, which means that the system does not validate that requests originate from legitimate user interactions within the authenticated session. CSRF attacks exploit the trust a web application places in the user's browser by tricking authenticated users into submitting malicious requests unknowingly, potentially altering configurations, disabling security features, or triggering other administrative actions. The CVSS 3.1 base score of 6.8 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and user interaction (UI:R). The impact on confidentiality, integrity, and availability is high, as an attacker could manipulate video surveillance settings or access sensitive video feeds. Although no public exploits or patches are currently available, the vulnerability represents a significant risk due to the critical nature of surveillance systems in security operations. The CWE-352 classification confirms the vulnerability type as CSRF. Organizations using these versions should be aware of the risk and take immediate steps to mitigate potential exploitation.
Potential Impact
The vulnerability could allow attackers to perform unauthorized actions on the C-MOR Video Surveillance system by leveraging authenticated users' sessions, potentially leading to unauthorized disclosure of video feeds (confidentiality breach), manipulation or deletion of recorded footage (integrity breach), and disruption of surveillance operations (availability breach). This could compromise physical security monitoring, delay incident response, and expose sensitive environments to further attacks. The requirement for high privileges and user interaction somewhat limits exploitation but does not eliminate risk, especially in environments where users have elevated access and may be targeted via phishing or social engineering. The absence of known exploits currently reduces immediate risk, but the critical nature of surveillance systems means that successful exploitation could have severe consequences for organizations in sectors such as critical infrastructure, government, transportation, and large enterprises. The lack of patches increases exposure time, emphasizing the need for proactive mitigation.
Mitigation Recommendations
1. Implement network-level access controls to restrict access to the C-MOR web interface only to trusted management networks or VPNs, reducing exposure to external attackers. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to limit the risk of compromised credentials being used to exploit the vulnerability. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the C-MOR interface. 4. Educate users with administrative access about phishing and social engineering risks to reduce the likelihood of inadvertent user interaction enabling CSRF attacks. 5. Monitor logs and network traffic for unusual or unauthorized configuration changes or access attempts to detect potential exploitation attempts early. 6. If possible, isolate the surveillance system on a segmented network to limit lateral movement in case of compromise. 7. Engage with the vendor for updates or patches and apply them promptly once available. 8. Consider deploying browser security extensions or policies that can help mitigate CSRF risks by restricting cross-site requests.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Italy
CVE-2024-45172: n/a
Description
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401 and 6.00PL01. Due to missing protection mechanisms, the C-MOR web interface is vulnerable to cross-site request forgery (CSRF) attacks. The C-MOR web interface offers no protection against cross-site request forgery (CSRF) attacks.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45172 identifies a cross-site request forgery (CSRF) vulnerability in the za-internet C-MOR Video Surveillance system, specifically versions 5.2401 and 6.00PL01. The root cause is the lack of CSRF protection mechanisms in the web interface, which means that the system does not validate that requests originate from legitimate user interactions within the authenticated session. CSRF attacks exploit the trust a web application places in the user's browser by tricking authenticated users into submitting malicious requests unknowingly, potentially altering configurations, disabling security features, or triggering other administrative actions. The CVSS 3.1 base score of 6.8 reflects a medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), requiring high privileges (PR:H), and user interaction (UI:R). The impact on confidentiality, integrity, and availability is high, as an attacker could manipulate video surveillance settings or access sensitive video feeds. Although no public exploits or patches are currently available, the vulnerability represents a significant risk due to the critical nature of surveillance systems in security operations. The CWE-352 classification confirms the vulnerability type as CSRF. Organizations using these versions should be aware of the risk and take immediate steps to mitigate potential exploitation.
Potential Impact
The vulnerability could allow attackers to perform unauthorized actions on the C-MOR Video Surveillance system by leveraging authenticated users' sessions, potentially leading to unauthorized disclosure of video feeds (confidentiality breach), manipulation or deletion of recorded footage (integrity breach), and disruption of surveillance operations (availability breach). This could compromise physical security monitoring, delay incident response, and expose sensitive environments to further attacks. The requirement for high privileges and user interaction somewhat limits exploitation but does not eliminate risk, especially in environments where users have elevated access and may be targeted via phishing or social engineering. The absence of known exploits currently reduces immediate risk, but the critical nature of surveillance systems means that successful exploitation could have severe consequences for organizations in sectors such as critical infrastructure, government, transportation, and large enterprises. The lack of patches increases exposure time, emphasizing the need for proactive mitigation.
Mitigation Recommendations
1. Implement network-level access controls to restrict access to the C-MOR web interface only to trusted management networks or VPNs, reducing exposure to external attackers. 2. Enforce strong authentication mechanisms, including multi-factor authentication (MFA), to limit the risk of compromised credentials being used to exploit the vulnerability. 3. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious CSRF attack patterns targeting the C-MOR interface. 4. Educate users with administrative access about phishing and social engineering risks to reduce the likelihood of inadvertent user interaction enabling CSRF attacks. 5. Monitor logs and network traffic for unusual or unauthorized configuration changes or access attempts to detect potential exploitation attempts early. 6. If possible, isolate the surveillance system on a segmented network to limit lateral movement in case of compromise. 7. Engage with the vendor for updates or patches and apply them promptly once available. 8. Consider deploying browser security extensions or policies that can help mitigate CSRF risks by restricting cross-site requests.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ce8b7ef31ef0b56a19a
Added to database: 2/25/2026, 9:43:04 PM
Last enriched: 2/26/2026, 8:08:11 AM
Last updated: 4/12/2026, 6:13:48 PM
Views: 17
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.