An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
Metrics
Affected Vendors & Products
References
History
Tue, 03 Dec 2024 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Tue, 03 Dec 2024 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Lorextechnology
Lorextechnology w461asc-e Firmware |
|
| CPEs | cpe:2.3:o:lorextechnology:w461asc-e_firmware:-:*:*:*:*:*:*:* | |
| Vendors & Products |
Lorextechnology
Lorextechnology w461asc-e Firmware |
|
| Metrics |
ssvc
|
Tue, 03 Dec 2024 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111. | |
| Title | Lorex 2K Indoor Wi-Fi Security Camera - Code signing bypass | |
| Weaknesses | CWE-345 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: rapid7
Published: 2024-12-03T17:29:59.241Z
Updated: 2024-12-03T21:04:00.985Z
Reserved: 2024-11-12T13:42:42.324Z
Link: CVE-2024-52548
Updated: 2024-12-03T18:37:50.260Z
Status : Received
Published: 2024-12-03T18:15:16.023
Modified: 2024-12-03T22:15:05.567
Link: CVE-2024-52548
No data.
ReportizFlow