CVE-2024-45173: n/a
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper privilege management concerning sudo privileges, C-MOR is vulnerable to a privilege escalation attack. The Linux user www-data running the C-MOR web interface can execute some OS commands as root via Sudo without having to enter the root password. These commands, for example, include cp, chown, and chmod, which enable an attacker to modify the system's sudoers file in order to execute all commands with root privileges. Thus, it is possible to escalate the limited privileges of the user www-data to root privileges.
AI Analysis
Technical Summary
CVE-2024-45173 is a critical privilege escalation vulnerability found in the za-internet C-MOR Video Surveillance software, specifically version 5.2401. The root cause is improper privilege management related to sudo permissions assigned to the Linux user www-data, which operates the C-MOR web interface. This user can execute certain operating system commands such as cp, chown, and chmod with root privileges via sudo without needing to provide the root password. These commands can be abused to alter the sudoers configuration file, effectively granting the attacker unrestricted root-level command execution capabilities. This vulnerability falls under CWE-269 (Improper Privilege Management). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability allows an attacker who has access to the www-data user context—typically through the web interface—to escalate privileges to root, potentially leading to full system compromise. Although no patches or exploits are currently documented, the risk remains significant given the nature of the flaw and the critical role of video surveillance systems in security infrastructure.
Potential Impact
The impact of CVE-2024-45173 is severe for organizations using the C-MOR Video Surveillance system. An attacker exploiting this vulnerability can gain root-level access to the underlying Linux system, leading to complete control over the device. This includes the ability to manipulate surveillance data, disable security monitoring, install persistent backdoors, or pivot to other network resources. The compromise of video surveillance systems can undermine physical security, violate privacy regulations, and damage organizational trust. Additionally, root access allows attackers to modify system configurations, delete logs, and evade detection. Given that video surveillance systems are often connected to critical infrastructure or sensitive environments, the potential for widespread disruption and data breaches is high. The vulnerability’s ease of exploitation and the absence of required user interaction increase the likelihood of successful attacks once the attacker gains initial access to the web interface.
Mitigation Recommendations
To mitigate CVE-2024-45173, organizations should immediately restrict access to the C-MOR web interface to trusted networks and authenticated users only, minimizing exposure to potential attackers. Network segmentation and firewall rules should be employed to limit access to the surveillance system. Since no official patch is currently available, administrators should audit and harden sudoers configurations to remove or tightly control any sudo privileges granted to the www-data user. Monitoring and alerting on changes to sudoers files and unusual use of cp, chown, and chmod commands by www-data can help detect exploitation attempts. Employing host-based intrusion detection systems (HIDS) and integrity monitoring tools can provide early warnings of privilege escalation activities. Organizations should also consider deploying application-layer firewalls or web application firewalls (WAFs) to detect and block malicious commands sent via the web interface. Finally, maintain regular backups of configuration and system files to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Italy
CVE-2024-45173: n/a
Description
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper privilege management concerning sudo privileges, C-MOR is vulnerable to a privilege escalation attack. The Linux user www-data running the C-MOR web interface can execute some OS commands as root via Sudo without having to enter the root password. These commands, for example, include cp, chown, and chmod, which enable an attacker to modify the system's sudoers file in order to execute all commands with root privileges. Thus, it is possible to escalate the limited privileges of the user www-data to root privileges.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2024-45173 is a critical privilege escalation vulnerability found in the za-internet C-MOR Video Surveillance software, specifically version 5.2401. The root cause is improper privilege management related to sudo permissions assigned to the Linux user www-data, which operates the C-MOR web interface. This user can execute certain operating system commands such as cp, chown, and chmod with root privileges via sudo without needing to provide the root password. These commands can be abused to alter the sudoers configuration file, effectively granting the attacker unrestricted root-level command execution capabilities. This vulnerability falls under CWE-269 (Improper Privilege Management). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability allows an attacker who has access to the www-data user context—typically through the web interface—to escalate privileges to root, potentially leading to full system compromise. Although no patches or exploits are currently documented, the risk remains significant given the nature of the flaw and the critical role of video surveillance systems in security infrastructure.
Potential Impact
The impact of CVE-2024-45173 is severe for organizations using the C-MOR Video Surveillance system. An attacker exploiting this vulnerability can gain root-level access to the underlying Linux system, leading to complete control over the device. This includes the ability to manipulate surveillance data, disable security monitoring, install persistent backdoors, or pivot to other network resources. The compromise of video surveillance systems can undermine physical security, violate privacy regulations, and damage organizational trust. Additionally, root access allows attackers to modify system configurations, delete logs, and evade detection. Given that video surveillance systems are often connected to critical infrastructure or sensitive environments, the potential for widespread disruption and data breaches is high. The vulnerability’s ease of exploitation and the absence of required user interaction increase the likelihood of successful attacks once the attacker gains initial access to the web interface.
Mitigation Recommendations
To mitigate CVE-2024-45173, organizations should immediately restrict access to the C-MOR web interface to trusted networks and authenticated users only, minimizing exposure to potential attackers. Network segmentation and firewall rules should be employed to limit access to the surveillance system. Since no official patch is currently available, administrators should audit and harden sudoers configurations to remove or tightly control any sudo privileges granted to the www-data user. Monitoring and alerting on changes to sudoers files and unusual use of cp, chown, and chmod commands by www-data can help detect exploitation attempts. Employing host-based intrusion detection systems (HIDS) and integrity monitoring tools can provide early warnings of privilege escalation activities. Organizations should also consider deploying application-layer firewalls or web application firewalls (WAFs) to detect and block malicious commands sent via the web interface. Finally, maintain regular backups of configuration and system files to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ce8b7ef31ef0b56a19f
Added to database: 2/25/2026, 9:43:04 PM
Last enriched: 2/26/2026, 8:08:32 AM
Last updated: 4/12/2026, 6:13:41 PM
Views: 24
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.