CVE-2025-13607
Multiple · Multiple Products from the affected vendor
A critical vulnerability has been identified that allows an unauthenticated attacker to remotely access sensitive camera configuration data, including administrative credentials.
Executive summary
A critical vulnerability has been identified that allows an unauthenticated attacker to remotely access sensitive camera configuration data, including administrative credentials. Successful exploitation could result in a complete compromise of affected camera systems, enabling attackers to view live feeds, access recordings, and potentially pivot to other areas of the network.
Vulnerability
This vulnerability is an Improper Access Control flaw. An attacker can send a specifically crafted HTTP request to a vulnerable URL on the device's web interface. The system fails to perform any authentication or authorization checks for this URL, granting the attacker direct access to sensitive configuration files which contain administrative usernames and passwords.
Business impact
This vulnerability is rated as critical severity with a CVSS score of 9.4. Exploitation poses a significant risk to the organization, potentially leading to a severe breach of physical security by allowing unauthorized surveillance of facilities. The compromise of credentials could lead to a complete takeover of the security camera infrastructure, loss of confidential video data, and reputational damage. Furthermore, these compromised devices could be used as an entry point for broader attacks against the internal corporate network.
Remediation
Immediate Action: Immediately update all affected camera products to the latest firmware or software version provided by the vendor. After patching, it is crucial to change all account credentials on the devices, as they may have been previously exposed.
Proactive Monitoring: Monitor web access logs for unusual requests to non-standard URLs or configuration endpoints. Network traffic should be monitored for connections from cameras to unknown or suspicious external IP addresses. Review device logs for any unauthorized configuration changes or access events.
Compensating Controls: If immediate patching is not feasible, isolate the affected cameras on a segmented network VLAN with strict firewall rules. Restrict all access to the camera's web management interface to a limited set of trusted administrative IP addresses.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the critical CVSS score of 9.4 and the potential for complete system compromise via an unauthenticated attack, this vulnerability requires immediate attention. We strongly recommend that organizations identify all vulnerable devices and apply the vendor-supplied patches without delay. Due to the risk of prior compromise, a mandatory password rotation for all camera accounts should be conducted post-patching.