Vulnerability Description
An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper privilege management concerning sudo privileges, C-MOR is vulnerable to a privilege escalation attack. The Linux user www-data running the C-MOR web interface can execute some OS commands as root via Sudo without having to enter the root password. These commands, for example, include cp, chown, and chmod, which enable an attacker to modify the system's sudoers file in order to execute all commands with root privileges. Thus, it is possible to escalate the limited privileges of the user www-data to root privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| C-Mor | C-Mor Video Surveillance | 5.2401 |
Related Weaknesses (CWE)
References
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-027.tExploitVendor Advisory
- https://www.syss.de/pentest-blog/mehrere-sicherheitsschwachstellen-in-videoueberVendor Advisory
- http://seclists.org/fulldisclosure/2024/Sep/20ExploitMailing ListThird Party Advisory
FAQ
What is CVE-2024-45173?
CVE-2024-45173 is a vulnerability with a CVSS score of 8.8 (HIGH). An issue was discovered in za-internet C-MOR Video Surveillance 5.2401. Due to improper privilege management concerning sudo privileges, C-MOR is vulnerable to a privilege escalation attack. The Linux...
How severe is CVE-2024-45173?
CVE-2024-45173 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-45173?
Check the references section above for vendor advisories and patch information. Affected products include: C-Mor C-Mor Video Surveillance.