Cyber Posture

CVE-2024-54848

HighPublic PoC

Published: 10 January 2025

Published
10 January 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0027 50.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.

Security Summary

CVE-2024-54848 is a vulnerability stemming from improper handling and storage of certificates in the CP Plus CP-VNR-3104 network video recorder running firmware version B3223P22C02424. This issue, mapped to CWE-295 (Improper Certificate Validation), enables potential decryption of communications and carries a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to significant confidentiality and integrity impacts.

Remote network-based attackers with no required privileges or user interaction can exploit this vulnerability, though it demands high attack complexity. Exploitation allows adversaries to decrypt protected communications or perform man-in-the-middle attacks, compromising the secrecy and integrity of data transmitted to or from the affected device.

References for further details include a security assessment PDF on GitHub (https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf), CAPEC attack pattern 233 (https://capec.mitre.org/data/definitions/233), an NVD entry for CVE-2021-21551 (https://nvd.nist.gov/vuln/detail/CVE-2021-21551), and a blog on encrypted firmware challenges (https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/). No specific patch or mitigation guidance is detailed in the provided CVE information.

Details

CWE(s)
CWE-295

Affected Products

cpplusworld
cp-vnr-3104 firmware
b3223p22c02424

MITRE ATT&CK Enterprise Techniques

T1552.004 Private Keys Credential Access
Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Improper certificate handling and storage enables access to private keys (T1552.004) for decryption and facilitates man-in-the-middle attacks (T1557).

References