Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0836: CWE-862 Missing Authorization in Milestone Systems XProtect VMS

0
Medium
VulnerabilityCVE-2025-0836cvecve-2025-0836cwe-862
Published: Tue Dec 16 2025 (12/16/2025, 11:02:25 UTC)
Source: CVE Database V5
Vendor/Project: Milestone Systems
Product: XProtect VMS

Description

Missing Authorization vulnerability in Milestone Systems XProtect VMS allows users with read-only access to Management Server to have full read/write access to MIP Webhooks API.

AI-Powered Analysis

AILast updated: 12/16/2025, 11:24:43 UTC

Technical Analysis

CVE-2025-0836 is a Missing Authorization vulnerability (CWE-862) identified in Milestone Systems XProtect Video Management System (VMS), versions 23.1 through 25.1. The vulnerability arises because the system fails to properly enforce authorization checks on the MIP Webhooks API. Specifically, users with read-only access to the Management Server component can exploit this flaw to gain full read/write privileges on the MIP Webhooks API. This API is typically used for integrating and automating external systems with XProtect, and unauthorized write access could allow attackers to manipulate webhook configurations, potentially disrupting video surveillance workflows or injecting malicious commands. The vulnerability is remotely exploitable over the network without requiring user interaction or elevated privileges beyond read-only access, increasing its risk profile. The CVSS v4.0 score of 5.3 reflects a medium severity, considering the ease of exploitation and the potential impact on system integrity and availability. No public exploits are known at this time, but the vulnerability's presence in widely deployed versions of XProtect VMS makes it a concern for organizations relying on this platform for security monitoring and surveillance.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for entities relying on XProtect VMS for critical security and surveillance operations such as airports, transportation hubs, government facilities, and large enterprises. Unauthorized write access to the MIP Webhooks API could allow attackers to alter webhook configurations, disable alerts, or inject malicious payloads that disrupt video monitoring or data collection. This could lead to loss of situational awareness, delayed incident response, or manipulation of recorded evidence, undermining physical security and compliance with data protection regulations like GDPR. Additionally, the integrity of security event data could be compromised, affecting forensic investigations. The vulnerability's exploitation could also serve as a foothold for further lateral movement within the network, increasing overall risk exposure.

Mitigation Recommendations

Organizations should prioritize deploying patches or updates from Milestone Systems as soon as they become available to address this authorization flaw. In the interim, administrators should audit and restrict read-only user permissions, ensuring that such accounts do not have access to sensitive API endpoints like MIP Webhooks. Network segmentation and firewall rules should be applied to limit access to the Management Server and its APIs to trusted hosts and users only. Implementing strong authentication and monitoring API usage logs for unusual activity can help detect exploitation attempts. Additionally, organizations should review webhook configurations regularly and employ anomaly detection to identify unauthorized changes. Engaging with Milestone support for guidance on temporary workarounds or configuration changes to mitigate risk is also recommended.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Milestone
Date Reserved
2025-01-29T13:24:34.734Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69413e06b7167ed5be6e7a75

Added to database: 12/16/2025, 11:09:58 AM

Last enriched: 12/16/2025, 11:24:43 AM

Last updated: 12/16/2025, 12:22:43 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats