CVE-2024-31799
Gncchome
CVE-2024-31799 is an information disclosure vulnerability affecting GNCC's GC2 Indoor Security Camera 1080P. It allows an attacker with physical access to the device to read the WiFi passphrase through the UART Debugging Port. While the CVSS score is 4.6, indicating a medium severity, the SOCRadar Vulnerability Risk Score (SVRS) is 47. This suggests the vulnerability, while not critical (SVRS > 80), still warrants attention. Exploitation requires physical access, limiting the scope of potential attacks. However, successful exploitation grants unauthorized access to the WiFi network, potentially compromising other devices on the network. This highlights the importance of securing physical access to IoT devices. The vulnerability falls under CWE-319, which signifies improper processing of security-critical data. Given the 'In The Wild' tag, proof of concept or active exploits exist, therefore patching or mitigation is recommended.
Description
CVE-2024-31799 is an information disclosure vulnerability in GNCC's GC2 Indoor Security Camera 1080P. An attacker with physical access to the device can read the WiFi passphrase via the UART Debugging Port. This vulnerability has a CVSS score of 4.6 and an SVRS of 30, indicating a moderate severity level.
Key Insights
- Physical Access Required: This vulnerability requires physical access to the affected device, making it less likely to be exploited remotely.
- WiFi Passphrase Disclosure: An attacker can obtain the WiFi passphrase, which could allow them to access the victim's network and launch further attacks.
- In The Wild: This vulnerability is actively exploited by hackers, highlighting the need for immediate action.
Mitigation Strategies
- Update Firmware: Install the latest firmware update from the vendor to patch the vulnerability.
- Disable UART Debugging Port: If possible, disable the UART Debugging Port to prevent unauthorized access.
- Change WiFi Passphrase: Change the WiFi passphrase to a strong and unique one to minimize the impact of the vulnerability.
- Monitor Network Traffic: Monitor network traffic for suspicious activity that may indicate exploitation of this vulnerability.
Additional Information
- Threat Actors/APT Groups: No specific threat actors or APT groups have been identified as actively exploiting this vulnerability.
- Exploit Status: Active exploits have been published.
- CISA Warnings: The Cybersecurity and Infrastructure Security Agency (CISA) has not issued a warning for this vulnerability.
If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.