CVE-2025-35451

PTZOptics · PTZOptics and possibly other Multiple Products

A critical vulnerability has been identified in PTZOptics and other ValueHD-based camera products, stemming from hard-coded administrative credentials.

Executive summary

A critical vulnerability has been identified in PTZOptics and other ValueHD-based camera products, stemming from hard-coded administrative credentials. This flaw allows an unauthenticated attacker to easily gain complete control of affected cameras, potentially leading to unauthorized surveillance, network compromise, and operational disruption. Due to the ease of exploitation and the critical impact, immediate remediation is strongly advised.

Vulnerability

Affected pan-tilt-zoom (PTZ) cameras are manufactured with hard-coded, default administrative credentials. An attacker can connect to the camera's exposed SSH or telnet services over the network and authenticate using these known or easily crackable credentials. Successful exploitation grants the attacker root-level or administrative access, allowing them to view and manipulate video feeds, alter device configurations, install malicious software, or use the compromised camera as a pivot point to attack other systems on the internal network.

Business impact

This vulnerability is rated as critical severity with a CVSS score of 9.8. Exploitation could have a severe impact on the organization, leading to significant security and operational risks. An attacker could compromise physical security by disabling or manipulating camera feeds to hide illicit activities. The breach of confidentiality through unauthorized access to video surveillance can result in espionage, privacy violations, and reputational damage. Furthermore, compromised cameras are frequently co-opted into botnets, which can be used to launch large-scale Distributed Denial-of-Service (DDoS) attacks, consuming network resources and potentially causing widespread service outages.

Remediation

Immediate Action: The primary remediation step is to update the firmware on all affected PTZOptics and other ValueHD-based cameras to the latest version provided by the vendor. This update is expected to remove the hard-coded credentials and enforce a unique password policy. In parallel, security teams should actively monitor for any signs of exploitation and review historical access logs for unauthorized logins via SSH or telnet.

Proactive Monitoring:

  • Log Analysis: Scrutinize system and access logs for successful administrative logins from unknown or suspicious IP addresses, particularly over SSH (port 22) and telnet (port 23).
  • Network Traffic: Monitor for anomalous network traffic originating from the cameras, such as connections to known command-and-control (C2) servers or participation in DDoS attacks (e.g., large volumes of UDP or TCP SYN traffic).
  • Configuration Integrity: Regularly check for unauthorized configuration changes, new user accounts, or unexpected services running on the devices.

Compensating Controls: If immediate patching is not feasible, implement the following controls to mitigate risk:

  • Network Segmentation: Isolate cameras on a dedicated VLAN with strict firewall rules that only permit access from authorized management stations and video recording systems.
  • Access Restriction: Explicitly block all inbound internet access to the cameras' management interfaces (SSH, telnet, web).
  • Password Change: If the device firmware allows, immediately change any default passwords to strong, unique credentials.

Exploitation status

Public Exploit Available: True

Analyst recommendation

Given the critical CVSS score of 9.8 and the trivial nature of exploitation, this vulnerability poses an immediate and significant threat to the organization. We strongly recommend that all affected devices be patched immediately. Although this CVE is not currently on the CISA KEV list, its characteristics make it a prime candidate for future inclusion. If patching cannot be performed immediately, the compensating controls outlined above, especially network segmentation and blocking external access, must be implemented without delay to prevent a compromise.