CVE-2024-45174: n/a
CVE-2024-45174 is a high-severity SQL injection vulnerability affecting the za-internet C-MOR Video Surveillance web interface versions 5. 2401 and 6. 00PL01. The flaw arises from improper validation of user-supplied data, allowing an authenticated user to execute arbitrary SQL commands on the backend MySQL database. Exploitation requires authentication but no user interaction beyond that. The vulnerability impacts confidentiality and integrity by enabling unauthorized data access and manipulation, but does not affect availability. No public exploits are known yet. Organizations using these C-MOR versions should prioritize patching or apply strict input validation and access controls to mitigate risk. Countries with significant deployments of this surveillance system, especially those with critical infrastructure relying on C-MOR, are at elevated risk.
AI Analysis
Technical Summary
CVE-2024-45174 identifies a SQL injection vulnerability in the za-internet C-MOR Video Surveillance software, specifically versions 5.2401 and 6.00PL01. The vulnerability stems from improper sanitization and validation of user-supplied input within various functionalities of the C-MOR web interface. This flaw allows an authenticated attacker to inject arbitrary SQL commands into the MySQL database backend. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector of network (remote), low attack complexity, requiring privileges (authenticated user), no user interaction, and impacting confidentiality and integrity but not availability. Exploiting this vulnerability could allow attackers to read sensitive data, modify or delete database records, and potentially escalate privileges within the application context. Although no public exploits are currently known, the presence of this vulnerability in surveillance software that may be deployed in sensitive environments raises significant security concerns. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations.
Potential Impact
The primary impact of CVE-2024-45174 is unauthorized access and manipulation of sensitive data stored within the C-MOR Video Surveillance system's MySQL database. This could lead to exposure of surveillance footage, user credentials, configuration data, or other confidential information. Integrity of the database can be compromised, allowing attackers to alter logs, disable alarms, or manipulate system settings, potentially undermining the security monitoring capabilities. Although availability is not directly affected, the loss of data integrity and confidentiality can have severe operational and reputational consequences. Organizations relying on C-MOR for critical infrastructure monitoring, law enforcement, or corporate security may face increased risk of espionage, sabotage, or regulatory non-compliance. The requirement for authentication limits exploitation to insiders or compromised accounts, but the low complexity and network accessibility increase the threat surface. The absence of known exploits currently provides a window for remediation before widespread attacks emerge.
Mitigation Recommendations
1. Immediately restrict access to the C-MOR web interface to trusted networks and users only, employing network segmentation and firewall rules. 2. Enforce strong authentication mechanisms and monitor for suspicious login activity to reduce risk from compromised credentials. 3. Implement web application firewalls (WAFs) with SQL injection detection and prevention rules tailored to the C-MOR interface. 4. Conduct thorough input validation and sanitization on all user-supplied data within the application, ideally applying parameterized queries or prepared statements to eliminate injection vectors. 5. Regularly audit database queries and logs for anomalous activity indicative of injection attempts. 6. Engage with the vendor for official patches or updates; if unavailable, consider temporary compensating controls such as disabling vulnerable functionalities or isolating the system. 7. Educate administrators and users about the risks of SQL injection and the importance of credential security. 8. Maintain up-to-date backups of surveillance data and configurations to enable recovery in case of data tampering.
Affected Countries
United States, Germany, France, United Kingdom, Japan, South Korea, China, Russia, Brazil, India
CVE-2024-45174: n/a
Description
CVE-2024-45174 is a high-severity SQL injection vulnerability affecting the za-internet C-MOR Video Surveillance web interface versions 5. 2401 and 6. 00PL01. The flaw arises from improper validation of user-supplied data, allowing an authenticated user to execute arbitrary SQL commands on the backend MySQL database. Exploitation requires authentication but no user interaction beyond that. The vulnerability impacts confidentiality and integrity by enabling unauthorized data access and manipulation, but does not affect availability. No public exploits are known yet. Organizations using these C-MOR versions should prioritize patching or apply strict input validation and access controls to mitigate risk. Countries with significant deployments of this surveillance system, especially those with critical infrastructure relying on C-MOR, are at elevated risk.
AI-Powered Analysis
Technical Analysis
CVE-2024-45174 identifies a SQL injection vulnerability in the za-internet C-MOR Video Surveillance software, specifically versions 5.2401 and 6.00PL01. The vulnerability stems from improper sanitization and validation of user-supplied input within various functionalities of the C-MOR web interface. This flaw allows an authenticated attacker to inject arbitrary SQL commands into the MySQL database backend. The vulnerability is classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command). The CVSS v3.1 score is 8.1, indicating high severity, with an attack vector of network (remote), low attack complexity, requiring privileges (authenticated user), no user interaction, and impacting confidentiality and integrity but not availability. Exploiting this vulnerability could allow attackers to read sensitive data, modify or delete database records, and potentially escalate privileges within the application context. Although no public exploits are currently known, the presence of this vulnerability in surveillance software that may be deployed in sensitive environments raises significant security concerns. The lack of available patches at the time of disclosure necessitates immediate mitigation efforts by affected organizations.
Potential Impact
The primary impact of CVE-2024-45174 is unauthorized access and manipulation of sensitive data stored within the C-MOR Video Surveillance system's MySQL database. This could lead to exposure of surveillance footage, user credentials, configuration data, or other confidential information. Integrity of the database can be compromised, allowing attackers to alter logs, disable alarms, or manipulate system settings, potentially undermining the security monitoring capabilities. Although availability is not directly affected, the loss of data integrity and confidentiality can have severe operational and reputational consequences. Organizations relying on C-MOR for critical infrastructure monitoring, law enforcement, or corporate security may face increased risk of espionage, sabotage, or regulatory non-compliance. The requirement for authentication limits exploitation to insiders or compromised accounts, but the low complexity and network accessibility increase the threat surface. The absence of known exploits currently provides a window for remediation before widespread attacks emerge.
Mitigation Recommendations
1. Immediately restrict access to the C-MOR web interface to trusted networks and users only, employing network segmentation and firewall rules. 2. Enforce strong authentication mechanisms and monitor for suspicious login activity to reduce risk from compromised credentials. 3. Implement web application firewalls (WAFs) with SQL injection detection and prevention rules tailored to the C-MOR interface. 4. Conduct thorough input validation and sanitization on all user-supplied data within the application, ideally applying parameterized queries or prepared statements to eliminate injection vectors. 5. Regularly audit database queries and logs for anomalous activity indicative of injection attempts. 6. Engage with the vendor for official patches or updates; if unavailable, consider temporary compensating controls such as disabling vulnerable functionalities or isolating the system. 7. Educate administrators and users about the risks of SQL injection and the importance of credential security. 8. Maintain up-to-date backups of surveillance data and configurations to enable recovery in case of data tampering.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2024-08-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6ce8b7ef31ef0b56a1a4
Added to database: 2/25/2026, 9:43:04 PM
Last enriched: 2/26/2026, 8:08:46 AM
Last updated: 2/26/2026, 8:45:10 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.