Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-45173: n/a

0
High
VulnerabilityCVE-2024-45173cvecve-2024-45173
Published: Thu Sep 05 2024 (09/05/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2024-45173 is a high-severity privilege escalation vulnerability in the za-internet C-MOR Video Surveillance software version 5. 2401. The vulnerability arises from improper sudo privilege management, allowing the Linux user www-data, which runs the C-MOR web interface, to execute certain OS commands as root without a password. Exploitable commands include cp, chown, and chmod, which can be leveraged to modify the sudoers file and gain unrestricted root access. This flaw enables an attacker with access to the web interface to escalate privileges from a limited user to full system control. No user interaction or authentication bypass is required beyond the www-data user context. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to affected systems. Organizations using C-MOR for video surveillance should prioritize patching or mitigating this issue to prevent potential full system compromise.

AI-Powered Analysis

AILast updated: 02/26/2026, 08:08:32 UTC

Technical Analysis

CVE-2024-45173 is a critical privilege escalation vulnerability found in the za-internet C-MOR Video Surveillance software, specifically version 5.2401. The root cause is improper privilege management related to sudo permissions assigned to the Linux user www-data, which operates the C-MOR web interface. This user can execute certain operating system commands such as cp, chown, and chmod with root privileges via sudo without needing to provide the root password. These commands can be abused to alter the sudoers configuration file, effectively granting the attacker unrestricted root-level command execution capabilities. This vulnerability falls under CWE-269 (Improper Privilege Management). The CVSS v3.1 base score is 8.8, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction required. The vulnerability allows an attacker who has access to the www-data user context—typically through the web interface—to escalate privileges to root, potentially leading to full system compromise. Although no patches or exploits are currently documented, the risk remains significant given the nature of the flaw and the critical role of video surveillance systems in security infrastructure.

Potential Impact

The impact of CVE-2024-45173 is severe for organizations using the C-MOR Video Surveillance system. An attacker exploiting this vulnerability can gain root-level access to the underlying Linux system, leading to complete control over the device. This includes the ability to manipulate surveillance data, disable security monitoring, install persistent backdoors, or pivot to other network resources. The compromise of video surveillance systems can undermine physical security, violate privacy regulations, and damage organizational trust. Additionally, root access allows attackers to modify system configurations, delete logs, and evade detection. Given that video surveillance systems are often connected to critical infrastructure or sensitive environments, the potential for widespread disruption and data breaches is high. The vulnerability’s ease of exploitation and the absence of required user interaction increase the likelihood of successful attacks once the attacker gains initial access to the web interface.

Mitigation Recommendations

To mitigate CVE-2024-45173, organizations should immediately restrict access to the C-MOR web interface to trusted networks and authenticated users only, minimizing exposure to potential attackers. Network segmentation and firewall rules should be employed to limit access to the surveillance system. Since no official patch is currently available, administrators should audit and harden sudoers configurations to remove or tightly control any sudo privileges granted to the www-data user. Monitoring and alerting on changes to sudoers files and unusual use of cp, chown, and chmod commands by www-data can help detect exploitation attempts. Employing host-based intrusion detection systems (HIDS) and integrity monitoring tools can provide early warnings of privilege escalation activities. Organizations should also consider deploying application-layer firewalls or web application firewalls (WAFs) to detect and block malicious commands sent via the web interface. Finally, maintain regular backups of configuration and system files to enable recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-08-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6ce8b7ef31ef0b56a19f

Added to database: 2/25/2026, 9:43:04 PM

Last enriched: 2/26/2026, 8:08:32 AM

Last updated: 2/26/2026, 11:03:27 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats