CVE-2024-45173: n/a
CVE-2024-45173 is a high-severity privilege escalation vulnerability in the za-internet C-MOR Video Surveillance software version 5. 2401. The vulnerability arises from improper sudo privilege management, allowing the Linux user www-data, which runs the C-MOR web interface, to execute certain OS commands as root without a password. Exploitable commands include cp, chown, and chmod, which can be leveraged to modify the sudoers file and gain unrestricted root access. This flaw enables an attacker with access to the web interface to escalate privileges from a limited user to full system control. No user interaction or authentication bypass is required beyond the www-data user context. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to affected systems. Organizations using C-MOR for video surveillance should prioritize patching or mitigating this issue to prevent potential full system compromise.
AI Analysis
Technical Summary
CVE-2024-45173 is a critical privilege escalation vulnerability found in the za-internet C-MOR Video Surveillance software, specifically version 5.2401. The root cause is improper privilege management related to sudo permissions assigned to the Linux user www-data, which operates the C-MOR web interface. This user can execute certain operating system commands such as cp, chown, and chmod with root privileges via sudo without needing to provide the root password. These commands can be abused to alter the sudoers configuration file, effectively granting the attacker unrestricted root-level command execution capabilities. This vulnerability falls under CWE-269 (Improper Privilege Management). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability allows an attacker who has access to the www-data user context—typically through the web interface—to escalate privileges to root, potentially leading to full system compromise. Although no patches or exploits are currently documented, the risk remains significant given the nature of the flaw and the critical role of video surveillance systems in security infrastructure.
Potential Impact
The impact of CVE-2024-45173 is severe for organizations using the C-MOR Video Surveillance system. An attacker exploiting this vulnerability can gain root-level access to the underlying Linux system, leading to complete control over the device. This includes the ability to manipulate surveillance data, disable security monitoring, install persistent backdoors, or pivot to other network resources. The compromise of video surveillance systems can undermine physical security, violate privacy regulations, and damage organizational trust. Additionally, root access allows attackers to modify system configurations, delete logs, and evade detection. Given that video surveillance systems are often connected to critical infrastructure or sensitive environments, the potential for widespread disruption and data breaches is high. The vulnerability’s ease of exploitation and the absence of required user interaction increase the likelihood of successful attacks once the attacker gains initial access to the web interface.
Mitigation Recommendations
To mitigate CVE-2024-45173, organizations should immediately restrict access to the C-MOR web interface to trusted networks and authenticated users only, minimizing exposure to potential attackers. Network segmentation and firewall rules should be employed to limit access to the surveillance system. Since no official patch is currently available, administrators should audit and harden sudoers configurations to remove or tightly control any sudo privileges granted to the www-data user. Monitoring and alerting on changes to sudoers files and unusual use of cp, chown, and chmod commands by www-data can help detect exploitation attempts. Employing host-based intrusion detection systems (HIDS) and integrity monitoring tools can provide early warnings of privilege escalation activities. Organizations should also consider deploying application-layer firewalls or web application firewalls (WAFs) to detect and block malicious commands sent via the web interface. Finally, maintain regular backups of configuration and system files to enable recovery in case of compromise.
Affected Countries
United States, Germany, United Kingdom, France, Japan, South Korea, Australia, Canada, Netherlands, Italy
CVE-2024-45173: n/a
Description
CVE-2024-45173 is a high-severity privilege escalation vulnerability in the za-internet C-MOR Video Surveillance software version 5. 2401. The vulnerability arises from improper sudo privilege management, allowing the Linux user www-data, which runs the C-MOR web interface, to execute certain OS commands as root without a password. Exploitable commands include cp, chown, and chmod, which can be leveraged to modify the sudoers file and gain unrestricted root access. This flaw enables an attacker with access to the web interface to escalate privileges from a limited user to full system control. No user interaction or authentication bypass is required beyond the www-data user context. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to affected systems. Organizations using C-MOR for video surveillance should prioritize patching or mitigating this issue to prevent potential full system compromise.
AI-Powered Analysis
Technical Analysis
CVE-2024-45173 is a critical privilege escalation vulnerability found in the za-internet C-MOR Video Surveillance software, specifically version 5.2401. The root cause is improper privilege management related to sudo permissions assigned to the Linux user www-data, which operates the C-MOR web interface. This user can execute certain operating system commands such as cp, chown, and chmod with root privileges via sudo without needing to provide the root password. These commands can be abused to alter the sudoers configuration file, effectively granting the attacker unrestricted root-level command execution capabilities. This vulnerability falls under CWE-269 (Improper Privilege Management). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability allows an attacker who has access to the www-data user context—typically through the web interface—to escalate privileges to root, potentially leading to full system compromise. Although no patches or exploits are currently documented, the risk remains significant given the nature of the flaw and the critical role of video surveillance systems in security infrastructure.
Potential Impact
The impact of CVE-2024-45173 is severe for organizations using the C-MOR Video Surveillance system. An attacker exploiting this vulnerability can gain root-level access to the underlying Linux system, leading to complete control over the device. This includes the ability to manipulate surveillance data, disable security monitoring, install persistent backdoors, or pivot to other network resources. The compromise of video surveillance systems can undermine physical security, violate privacy regulations, and damage organizational trust. Additionally, root access allows attackers to modify system configurations, delete logs, and evade detection. Given that video surveillance systems are often connected to critical infrastructure or sensitive environments, the potential for widespread disruption and data breaches is high. The vulnerability’s ease of exploitation and the absence of required user interaction increase the likelihood of successful attacks once the attacker gains initial access to the web interface.
Mitigation Recommendations
To mitigate CVE-2024-45173, organizations should immediately restrict access to the C-MOR web interface to trusted networks and authenticated users only, minimizing exposure to potential attackers. Network segmentation and firewall rules should be employed to limit access to the surveillance system. Since no official patch is currently available, administrators should audit and harden sudoers configurations to remove or tightly control any sudo privileges granted to the www-data user. Monitoring and alerting on changes to sudoers files and unusual use of cp, chown, and chmod commands by www-data can help detect exploitation attempts. Employing host-based intrusion detection systems (HIDS) and integrity monitoring tools can provide early warnings of privilege escalation activities. Organizations should also consider deploying application-layer firewalls or web application firewalls (WAFs) to detect and block malicious commands sent via the web interface. Finally, maintain regular backups of configuration and system files to enable recovery in case of compromise.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ce8b7ef31ef0b56a19f
Added to database: 2/25/2026, 9:43:04 PM
Last enriched: 2/26/2026, 8:08:32 AM
Last updated: 2/26/2026, 11:03:27 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-64999: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Checkmk GmbH Checkmk
HighCVE-2026-28138: Deserialization of Untrusted Data in Stylemix uListing
HighCVE-2026-28136: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in VeronaLabs WP SMS
HighCVE-2026-28132: Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in villatheme WooCommerce Photo Reviews
HighCVE-2026-28131: Insertion of Sensitive Information Into Sent Data in WPVibes Elementor Addon Elements
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.