Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-48775: n/a

0
High
VulnerabilityCVE-2024-48775cvecve-2024-48775
Published: Fri Oct 11 2024 (10/11/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue in Plug n Play Camera com.ezset.delaney 1.2.0 allows a remote attacker to obtain sensitive information via the firmware update process.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:42:19 UTC

Technical Analysis

CVE-2024-48775 is a vulnerability identified in the Plug n Play Camera application com.ezset.delaney version 1.2.0, disclosed on October 11, 2024. The flaw arises from inadequate access control during the firmware update process, classified under CWE-306 (Missing Authentication for Critical Function). This allows a remote attacker to connect to the device over the network and retrieve sensitive information without any authentication or user interaction. The vulnerability has a CVSS 3.1 base score of 7.5, reflecting its high severity due to ease of exploitation (network attack vector, low attack complexity, no privileges or user interaction required) and the impact on confidentiality (high). The attacker can leverage this flaw to extract confidential data from the device, potentially including firmware contents or configuration details that could facilitate further attacks or privacy breaches. No integrity or availability impacts are noted, and no patches have been published yet. There are no known exploits in the wild at this time, but the vulnerability’s nature makes it a significant concern for organizations deploying these cameras, especially in sensitive environments. The lack of authentication on a critical function like firmware update is a serious security oversight, increasing the risk of espionage or data leakage.

Potential Impact

The primary impact of CVE-2024-48775 is the unauthorized disclosure of sensitive information from affected camera devices. This can lead to privacy violations, exposure of proprietary or personal data, and potentially enable attackers to develop further exploits or conduct surveillance. Organizations relying on these cameras for security, monitoring, or operational purposes may face confidentiality breaches that undermine trust and compliance with data protection regulations. Although the vulnerability does not affect system integrity or availability, the leakage of firmware or configuration data can facilitate secondary attacks, including firmware tampering or device takeover. The ease of remote exploitation without authentication increases the attack surface, especially in environments where these devices are accessible over untrusted networks. This risk is amplified in sectors such as government, critical infrastructure, healthcare, and corporate environments where sensitive information is handled. The absence of patches means organizations must rely on compensating controls until a fix is available.

Mitigation Recommendations

1. Immediately restrict network access to the firmware update interface of affected devices by implementing network segmentation and firewall rules limiting access to trusted management networks only. 2. Monitor network traffic for unusual or unauthorized firmware update attempts, using intrusion detection systems or network behavior analysis tools. 3. Disable automatic or remote firmware updates if possible until a secure patch is released. 4. Engage with the vendor to obtain timely patches or firmware updates addressing this vulnerability. 5. Conduct regular security assessments of IoT devices to identify and remediate similar access control weaknesses. 6. Employ strong network authentication and encryption mechanisms around IoT device management interfaces to reduce exposure. 7. Maintain an inventory of affected devices and prioritize their replacement or isolation in high-risk environments. 8. Educate IT and security teams about this vulnerability to ensure rapid detection and response to potential exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2024-10-08T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6b7ab7ef31ef0b555c3e

Added to database: 2/25/2026, 9:36:58 PM

Last enriched: 2/27/2026, 9:42:19 PM

Last updated: 4/11/2026, 6:44:34 PM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses