An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
History

Tue, 03 Dec 2024 21:30:00 +0000


Tue, 03 Dec 2024 19:15:00 +0000

Type Values Removed Values Added
First Time appeared Lorextechnology
Lorextechnology w461asc-e Firmware
CPEs cpe:2.3:o:lorextechnology:w461asc-e_firmware:-:*:*:*:*:*:*:*
Vendors & Products Lorextechnology
Lorextechnology w461asc-e Firmware
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 03 Dec 2024 17:45:00 +0000

Type Values Removed Values Added
Description An attacker who can execute arbitrary Operating Systems commands, can bypass code signing enforcements in the kernel, and execute arbitrary native code. This vulnerability has been resolved in firmware version 2.800.0000000.8.R.20241111.
Title Lorex 2K Indoor Wi-Fi Security Camera - Code signing bypass
Weaknesses CWE-345
References
Metrics cvssV3_1

{'score': 6.7, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: rapid7

Published: 2024-12-03T17:29:59.241Z

Updated: 2024-12-03T21:04:00.985Z

Reserved: 2024-11-12T13:42:42.324Z

Link: CVE-2024-52548

cve-icon Vulnrichment

Updated: 2024-12-03T18:37:50.260Z

cve-icon NVD

Status : Received

Published: 2024-12-03T18:15:16.023

Modified: 2024-12-03T22:15:05.567

Link: CVE-2024-52548

cve-icon Redhat

No data.