CVE-2026-32644
Milesight · AIOT Cameras
Milesight AIOT cameras use SSL certificates with default private keys, enabling potential man-in-the-middle attacks.
Executive summary
Milesight AIOT cameras are vulnerable to traffic interception due to the use of hardcoded, default SSL private keys in specific firmware versions.
Vulnerability
The firmware utilizes default private keys for SSL/TLS communication, allowing an unauthenticated attacker to decrypt encrypted traffic or perform sophisticated man-in-the-middle (MitM) attacks.
Business impact
The CVSS score of 9.8 reflects the high risk of traffic interception and unauthorized access to sensitive video feeds and administrative credentials. This flaw undermines the entire security architecture of the camera deployment, potentially leading to unauthorized surveillance or credential theft.
Remediation
Immediate Action: Update camera firmware to the latest available version provided by Milesight that addresses the default key issue.
Proactive Monitoring: Review network traffic logs for anomalous SSL/TLS handshake patterns or unauthorized connection attempts to the camera management interfaces.
Compensating Controls: Isolate camera networks using VLANs and restrict access to management interfaces via a VPN or firewalled proxy.
Exploitation status
Public Exploit Available: False
Analyst recommendation
Organizations must prioritize firmware updates for all deployed Milesight cameras. If immediate patching is not possible, segmenting these devices from the primary network is essential to mitigate the risk of interception.