Skip to main content

CVE-2024-6047: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in GeoVision GV_DSP_LPR_V2

Critical
VulnerabilityCVE-2024-6047cvecve-2024-6047cwe-78
Published: Mon Jun 17 2024 (06/17/2024, 05:48:42 UTC)
Source: CVE
Vendor/Project: GeoVision
Product: GV_DSP_LPR_V2

Description

Certain EOL GeoVision devices fail to properly filter user input for the specific functionality. Unauthenticated remote attackers can exploit this vulnerability to inject and execute arbitrary system commands on the device.

AI-Powered Analysis

AILast updated: 07/05/2025, 07:57:58 UTC

Technical Analysis

CVE-2024-6047 is a critical security vulnerability classified under CWE-78, which pertains to improper neutralization of special elements used in OS command execution, commonly known as OS Command Injection. This vulnerability affects all versions of the GeoVision GV_DSP_LPR_V2 product, which is an End-of-Life (EOL) device line. The core issue arises from the device's failure to properly sanitize or filter user input in a specific functionality, allowing unauthenticated remote attackers to inject arbitrary system commands. Because the vulnerability requires no authentication or user interaction, an attacker can remotely execute commands on the underlying operating system with the same privileges as the vulnerable service. The CVSS v3.1 base score is 9.8, indicating a critical severity level, with attack vector being network-based (AV:N), no privileges required (PR:N), no user interaction (UI:N), and full impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are currently known in the wild, the high severity and ease of exploitation make this a significant threat. The vulnerability is particularly dangerous because it allows complete system compromise, potentially enabling attackers to pivot within networks, exfiltrate sensitive data, disrupt services, or deploy malware. The lack of available patches or mitigations from the vendor, given the product's EOL status, further exacerbates the risk.

Potential Impact

For European organizations, the impact of this vulnerability can be severe, especially for those relying on GeoVision GV_DSP_LPR_V2 devices for license plate recognition or other security monitoring functions. Successful exploitation could lead to full device compromise, allowing attackers to manipulate or disable security systems, disrupt physical security operations, or use the compromised devices as footholds for lateral movement within corporate or critical infrastructure networks. This could result in data breaches, operational disruptions, and potential safety risks. Given the critical nature of the vulnerability and the lack of vendor patches, organizations face increased risk of targeted attacks, particularly in sectors such as transportation, law enforcement, and public safety where such devices are commonly deployed. Additionally, the ability to execute arbitrary commands without authentication makes it easier for attackers to automate exploitation at scale, increasing the threat surface for European entities.

Mitigation Recommendations

Since the product is End-of-Life and no patches are currently available, European organizations should prioritize immediate risk reduction strategies. These include: 1) Isolating affected GeoVision GV_DSP_LPR_V2 devices on segmented networks with strict firewall rules to limit inbound access only to trusted management hosts; 2) Employing network intrusion detection/prevention systems (IDS/IPS) to monitor and block suspicious command injection attempts targeting these devices; 3) Disabling or restricting the vulnerable functionality if possible through device configuration; 4) Replacing EOL devices with supported, patched alternatives from the vendor or other suppliers; 5) Conducting thorough asset inventories to identify all affected devices and ensuring they are not exposed to untrusted networks, especially the internet; 6) Implementing strict access controls and monitoring for unusual device behavior indicative of compromise; and 7) Engaging with GeoVision or third-party security experts for potential custom mitigations or compensating controls. Organizations should also prepare incident response plans specifically addressing potential exploitation scenarios involving these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
twcert
Date Reserved
2024-06-17T02:00:24.960Z
Cisa Enriched
true
Cvss Version
3.1
State
PUBLISHED

Threat ID: 682d9819c4522896dcbd89b2

Added to database: 5/21/2025, 9:08:41 AM

Last enriched: 7/5/2025, 7:57:58 AM

Last updated: 7/27/2025, 4:53:19 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats