CVE-2024-56898 - Broken access control vulnerability in Geovision GV-ASManager web application with version v6.1.0.0 or less. This vulnerability allows low privilege users perform actions that they aren't authorized to, which can be leveraged to escalate privileges, create, modify or delete accounts.
To perform successful attack an attacker requires:
- GeoVision ASManager version 6.1.0.0 or less
- Network access to the GV-ASManager web application (there are cases when there are public access)
- Access to a Guest account (enabled by default: Username:
Guest; Password:<blank>), or any low privilege account.
The vulnerability can be leveraged to perform the following unauthorized actions:
- A low privilege account which isn't authorized to manage accounts is able to:
- Enable and disable any account.
- Create new accounts.
- Modify privileges of any account.
- Listing accounts and their information.
- After the escalation of the privileges, an attacker will be able to:
- Access the resources such as monitoring cameras, access cards, parking cars, employees and visitors, etc.
- Make changes in data and service network configurations such as employees, access card security information, IP addresses and configurations, etc.
- Disrupt and disconnect services such as monitoring cameras, access controls.
- Clone and duplicate access control data for further attack scenarios.
- Perform CVE-2024-56902 attack to retrieve cleartext password that can be reused in other digital assets of the organization.
Listing accounts before we start the attack
In the list of operators there are the Administrator account and Guest account enabled by default [Username: Guest; Password: <blank>], and there are no low-privilege users added.
Guest account has permission only to change his/her account password and theme
As it is visible in the screenshot above, a Guest account has no privilege to manage accounts or anything in ASWeb, only changing his/her account password, theme switch, and logout.
Adding a new low-privilege account "JustUser" with unauthorized Guest account
Despite the unsuccessful response, the JustUser account is still created by Guest account, visible in the screenshot below.

Administrator's view: JustUser has been added by unauthorized Guest account
From the Administrator's view we see that the JustUser account has been created by unauthorized Guest account. As it is visible, JustUser account still doesn't have write and execute privileges, but we can escalate privileges to Administrator, shown in the next screenshot.
Escalating JustUser's privilege with unauthorized Guest account
In the screenshot below, we escalated privileges for JustUser from low-privilege to the Administrator by using Guest account. The escalation was done with manipulating level from 1 [Users] to 2 [Supervisor/Administrator].
JustUser account got administrative permission
From the Administrator's view we see that the JustUser account's privilege has been escalated by unauthorized Guest account. And now the administrator isn't able to make modification in the privileges of JustUser account anymore.
Note: Here we demonstrated the steps of creating account and escalating privileges separately, while it is possible to do it together with just one request.
As JustUser account has Administrator privilege, now the attacker has full access in the AS Manager (Including ASWeb, TAWeb, VMWeb, ASManager software in OS)
JustUser is an administrator in ASWeb
JustUser is an administrator in TAWeb
JustUser is an administrator in VMWeb
JustUser is an administrator in ASManager software in OS
ASWeb - Access & Security Management
TAWeb - Time and Attendance Management
VMWeb - Visitor Management
ASManager - Access & Security Management software in OS
Removing legit administrator account
The legit administrator account has been deleted
The vendor of the product GeoVision is informed and they already released the newest fixed version 6.1.2.0 (as of January 2025)
INFO: While the version 6.1.1.0 is also fixed to the above described vulnerability, it is still vulnerable to another attack - Cross-Site Request Forgery [Described here: LINK].
Download the latest version from here
If you have a question, you can contact me, Giorgi Dograshvili on LinkedIn.