Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-0836: CWE-862 Missing Authorization in Milestone Systems XProtect VMS

0
Medium
VulnerabilityCVE-2025-0836cvecve-2025-0836cwe-862
Published: Tue Dec 16 2025 (12/16/2025, 11:02:25 UTC)
Source: CVE Database V5
Vendor/Project: Milestone Systems
Product: XProtect VMS

Description

Missing Authorization vulnerability in Milestone Systems XProtect VMS allows users with read-only access to Management Server to have full read/write access to MIP Webhooks API.

AI-Powered Analysis

AILast updated: 12/23/2025, 12:11:36 UTC

Technical Analysis

CVE-2025-0836 is a missing authorization vulnerability identified in Milestone Systems XProtect Video Management Software (VMS), versions 23.1 through 25.1. The vulnerability stems from improper access control in the MIP Webhooks API, which is designed to allow external systems to receive event notifications from XProtect. Normally, users with read-only access to the Management Server should not be able to modify webhook configurations. However, due to this flaw, such users can escalate their privileges to gain full read/write access to the MIP Webhooks API. This unauthorized access enables them to create, modify, or delete webhook subscriptions, potentially disrupting event notifications or enabling further attack vectors such as injecting malicious payloads or triggering unauthorized actions. The vulnerability does not require user interaction and can be exploited remotely over the network with low complexity and no authentication beyond read-only access. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required beyond read-only (PR:L), and no user interaction (UI:N). The impact on confidentiality, integrity, and availability is limited but notable, as unauthorized webhook modifications could affect system behavior and monitoring. No public exploits or patches are currently available, but the vulnerability has been officially published and assigned a medium severity rating with a CVSS score of 5.3.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity and availability of video management workflows and event notification systems. Unauthorized modification of webhook configurations could lead to missed or falsified event notifications, impacting security monitoring and incident response. Organizations relying on XProtect VMS for critical infrastructure surveillance, access control, or compliance monitoring could experience operational disruptions or data integrity issues. Attackers with read-only access—potentially low-level users or compromised accounts—could leverage this flaw to escalate privileges within the VMS environment. While confidentiality impact is limited, the ability to alter webhook behavior may facilitate further attacks or evade detection. The lack of known exploits reduces immediate risk, but the widespread use of Milestone XProtect in European security environments means the vulnerability could be targeted in the future. The medium severity rating reflects a moderate risk that should be addressed promptly to avoid potential exploitation.

Mitigation Recommendations

1. Immediately review and restrict read-only user permissions on the Management Server to only trusted personnel, minimizing the number of accounts with such access. 2. Monitor and audit all API access logs, specifically focusing on MIP Webhooks API calls, to detect any unauthorized read/write operations. 3. Implement network segmentation and firewall rules to limit access to the Management Server and its APIs to authorized systems and users only. 4. Apply vendor patches or updates as soon as they become available; maintain close communication with Milestone Systems for patch release announcements. 5. Consider disabling or limiting webhook functionality temporarily if not critical, until a patch is applied. 6. Employ multi-factor authentication and strong credential policies to reduce the risk of account compromise that could be leveraged to exploit this vulnerability. 7. Conduct regular security assessments and penetration tests focusing on access control mechanisms within the VMS environment to detect similar authorization issues.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Milestone
Date Reserved
2025-01-29T13:24:34.734Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69413e06b7167ed5be6e7a75

Added to database: 12/16/2025, 11:09:58 AM

Last enriched: 12/23/2025, 12:11:36 PM

Last updated: 2/7/2026, 12:55:38 PM

Views: 180

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats