CVE-2025-10264

Multiple · Multiple Digiever Network Video Recorder (NVR) models

A critical vulnerability has been identified in multiple Digiever Network Video Recorder (NVR) models.

Executive summary

A critical vulnerability has been identified in multiple Digiever Network Video Recorder (NVR) models. This flaw allows an unauthenticated attacker on the network to remotely access a system configuration file, which likely contains sensitive information such as administrator credentials, leading to a complete takeover of the device and the associated surveillance system.

Vulnerability

The vulnerability is an Exposure of Sensitive Information that allows an unauthenticated remote attacker to access critical system configuration files. An attacker can exploit this by sending a specially crafted request to the device, bypassing all authentication mechanisms. The exposed configuration file contains sensitive data, including administrative credentials and network settings, in a plaintext or easily decipherable format, which can be used to gain full administrative control over the NVR.

Business impact

This vulnerability is rated as critical with a CVSS score of 10.0. A successful exploit could lead to a complete compromise of an organization's physical security monitoring capabilities. Potential consequences include attackers viewing, manipulating, or deleting live and recorded video footage, effectively blinding security operations. Furthermore, a compromised NVR can be used as a pivot point to launch further attacks against the internal corporate network, posing a significant risk to the broader IT infrastructure. The breach of surveillance data could also lead to severe reputational damage and regulatory penalties.

Remediation

Immediate Action: Immediately apply the latest firmware updates provided by Digiever to all affected NVR models as this is the primary method to resolve the vulnerability. Before and after patching, review system and access logs for any evidence of unauthorized access to configuration files or suspicious login activity.

Proactive Monitoring: Monitor network traffic to and from the NVRs for unusual patterns, such as large data transfers or connections to unknown IP addresses. In system logs, search for anomalous requests for system configuration files or repeated failed login attempts followed by a successful login from an unfamiliar source.

Compensating Controls: If immediate patching is not feasible, implement the following controls:

  • Isolate the NVRs on a segmented network, separate from critical business systems and user networks.
  • Restrict all access to the NVR's management interface to a limited set of authorized IP addresses using a firewall or Access Control Lists (ACLs).
  • Ensure the NVRs are not directly exposed to the public internet. If remote access is required, it must be secured behind a Virtual Private Network (VPN).

Exploitation status

Public Exploit Available: False

Analyst recommendation

Given the critical CVSS score of 10.0, this vulnerability represents a severe and immediate threat to the organization. We strongly recommend that all affected Digiever NVRs be patched immediately. Although this vulnerability is not currently on the CISA Known Exploited Vulnerabilities (KEV) catalog, its characteristics make it a prime candidate for future inclusion. Due to the high likelihood of exploitation, patching should be treated as an emergency action. If patching cannot be performed immediately, the compensating controls listed above must be implemented without delay to mitigate the risk of compromise.