Cyber Posture

CVE-2024-54848

HighPublic PoC

Published: 10 January 2025

Published
10 January 2025
Modified
02 October 2025
KEV Added
Patch
CVSS Score 7.4 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
EPSS Score 0.0027 50.5th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2024-54848 is a high-severity Improper Certificate Validation (CWE-295) vulnerability in Cpplusworld Cp-Vnr-3104 Firmware. Its CVSS base score is 7.4 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Private Keys (T1552.004); ranked in the top 49.5% of CVEs by exploit likelihood; it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SC-17 (Public Key Infrastructure Certificates) and SC-23 (Session Authenticity).

Threat & Defense at a Glance

What attackers do: exploitation maps to Private Keys (T1552.004) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SC-17 mandates the proper selection, validation, revocation, and management of PKI certificates, directly addressing the improper handling and storage that enables decryption or MITM attacks in this CVE.

prevent

SC-23 requires mechanisms to protect communications session authenticity, preventing man-in-the-middle attacks exploiting the certificate vulnerability.

prevent

SC-8 enforces confidentiality and integrity protections for transmitted information, mitigating decryption of communications due to flawed certificate handling.

MITRE ATT&CK Enterprise TechniquesAI

T1552.004 Private Keys Credential Access
Adversaries may search for private key certificate files on compromised systems for insecurely stored credentials.
T1557 Adversary-in-the-Middle Credential Access
Adversaries may attempt to position themselves between two or more networked devices using an adversary-in-the-middle (AiTM) technique to support follow-on behaviors such as [Network Sniffing](https://attack.
Why these techniques?

Improper certificate handling and storage enables access to private keys (T1552.004) for decryption and facilitates man-in-the-middle attacks (T1557).

NVD Description

Improper handling and storage of certificates in CP Plus CP-VNR-3104 B3223P22C02424 allow attackers to decrypt communications or execute a man-in-the-middle attacks.

Deeper analysisAI

CVE-2024-54848 is a vulnerability stemming from improper handling and storage of certificates in the CP Plus CP-VNR-3104 network video recorder running firmware version B3223P22C02424. This issue, mapped to CWE-295 (Improper Certificate Validation), enables potential decryption of communications and carries a CVSS v3.1 base score of 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N), indicating high severity due to significant confidentiality and integrity impacts.

Remote network-based attackers with no required privileges or user interaction can exploit this vulnerability, though it demands high attack complexity. Exploitation allows adversaries to decrypt protected communications or perform man-in-the-middle attacks, compromising the secrecy and integrity of data transmitted to or from the affected device.

References for further details include a security assessment PDF on GitHub (https://github.com/Yashodhanvivek/CP-VNR-3104-NVR-Vulnerabilties/blob/main/CPPlus_CP-VNR-3104_Security_Assessment.pdf), CAPEC attack pattern 233 (https://capec.mitre.org/data/definitions/233), an NVD entry for CVE-2021-21551 (https://nvd.nist.gov/vuln/detail/CVE-2021-21551), and a blog on encrypted firmware challenges (https://payatu.com/blog/solving-the-problem-of-encrypted-firmware/). No specific patch or mitigation guidance is detailed in the provided CVE information.

Details

CWE(s)

Affected Products

cpplusworld
cp-vnr-3104 firmware
b3223p22c02424

CVEs Like This One

CVE-2025-1193Shared CWE-295
CVE-2025-46788Shared CWE-295
CVE-2026-33810Shared CWE-295
CVE-2026-32627Shared CWE-295
CVE-2024-55581Shared CWE-295
CVE-2025-11043Shared CWE-295
CVE-2026-4434Shared CWE-295
CVE-2026-25160Shared CWE-295
CVE-2025-0500Shared CWE-295
CVE-2026-4396Shared CWE-295

References