CVE-2025-10264: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Digiever DS-1200
Certain models of NVR developed by Digiever has an Exposure of Sensitive Information vulnerability, allowing unauthenticated remoter attackers to access the system configuration file and obtain plaintext credentials of the NVR and its connected cameras.
AI Analysis
Technical Summary
CVE-2025-10264 is a critical vulnerability identified in certain models of the Digiever DS-1200 Network Video Recorder (NVR) devices. The vulnerability is categorized under CWE-497, which pertains to the exposure of sensitive system information to an unauthorized control sphere. Specifically, this flaw allows unauthenticated remote attackers to access the system configuration file of the affected NVR devices. This configuration file contains plaintext credentials not only for the NVR itself but also for the connected cameras. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers gaining access to these credentials can compromise the entire video surveillance infrastructure, potentially altering configurations, disabling cameras, or intercepting sensitive video feeds. The vulnerability affects all versions of the DS-1200 product line as indicated by the affectedVersions field. Despite the absence of publicly known exploits in the wild at the time of publication, the CVSS score of 10.0 reflects the maximum severity due to the ease of exploitation and the critical nature of the information exposed. No patches or mitigation links have been provided yet, which increases the urgency for affected organizations to implement compensating controls. Given the role of NVRs in security and surveillance, this vulnerability poses a significant risk to physical security and privacy, especially in environments relying on Digiever DS-1200 devices for video monitoring and recording.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. NVRs like the Digiever DS-1200 are commonly deployed in critical infrastructure sectors such as transportation hubs, government facilities, corporate campuses, and public safety environments. Exposure of plaintext credentials can lead to unauthorized access to surveillance systems, enabling attackers to manipulate video feeds, disable cameras, or exfiltrate sensitive video data. This compromises both physical security and privacy compliance obligations under regulations such as GDPR. The integrity and availability of surveillance data are also at risk, potentially disrupting security operations and incident response. Additionally, attackers could leverage the compromised credentials to pivot into broader network environments, increasing the risk of lateral movement and further compromise. The critical severity and ease of exploitation mean that European entities using these devices face an urgent threat that could lead to significant operational disruption, reputational damage, and regulatory penalties if exploited.
Mitigation Recommendations
Given the absence of official patches at the time of reporting, European organizations should adopt immediate compensating controls. First, isolate affected Digiever DS-1200 devices on segmented networks with strict access controls to limit exposure to untrusted networks. Employ network-level filtering such as firewall rules or VLAN segmentation to restrict inbound access to the NVRs only to trusted management stations. Change default credentials on all connected cameras and the NVR itself to strong, unique passwords to reduce the risk of credential reuse. Monitor network traffic for unusual access patterns or attempts to retrieve configuration files. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting attempts to exploit this vulnerability. Where possible, disable remote management interfaces or restrict them via VPNs or secure tunnels. Maintain up-to-date asset inventories to identify all affected devices and prioritize remediation. Engage with Digiever for updates on patches or firmware upgrades and plan for rapid deployment once available. Finally, conduct regular security audits and penetration testing focused on physical security systems to detect and mitigate similar vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-10264: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Digiever DS-1200
Description
Certain models of NVR developed by Digiever has an Exposure of Sensitive Information vulnerability, allowing unauthenticated remoter attackers to access the system configuration file and obtain plaintext credentials of the NVR and its connected cameras.
AI-Powered Analysis
Technical Analysis
CVE-2025-10264 is a critical vulnerability identified in certain models of the Digiever DS-1200 Network Video Recorder (NVR) devices. The vulnerability is categorized under CWE-497, which pertains to the exposure of sensitive system information to an unauthorized control sphere. Specifically, this flaw allows unauthenticated remote attackers to access the system configuration file of the affected NVR devices. This configuration file contains plaintext credentials not only for the NVR itself but also for the connected cameras. Because the vulnerability requires no authentication (PR:N) and no user interaction (UI:N), it can be exploited remotely over the network (AV:N) with low attack complexity (AC:L). The vulnerability impacts confidentiality, integrity, and availability (C:H/I:H/A:H), as attackers gaining access to these credentials can compromise the entire video surveillance infrastructure, potentially altering configurations, disabling cameras, or intercepting sensitive video feeds. The vulnerability affects all versions of the DS-1200 product line as indicated by the affectedVersions field. Despite the absence of publicly known exploits in the wild at the time of publication, the CVSS score of 10.0 reflects the maximum severity due to the ease of exploitation and the critical nature of the information exposed. No patches or mitigation links have been provided yet, which increases the urgency for affected organizations to implement compensating controls. Given the role of NVRs in security and surveillance, this vulnerability poses a significant risk to physical security and privacy, especially in environments relying on Digiever DS-1200 devices for video monitoring and recording.
Potential Impact
For European organizations, the impact of this vulnerability is substantial. NVRs like the Digiever DS-1200 are commonly deployed in critical infrastructure sectors such as transportation hubs, government facilities, corporate campuses, and public safety environments. Exposure of plaintext credentials can lead to unauthorized access to surveillance systems, enabling attackers to manipulate video feeds, disable cameras, or exfiltrate sensitive video data. This compromises both physical security and privacy compliance obligations under regulations such as GDPR. The integrity and availability of surveillance data are also at risk, potentially disrupting security operations and incident response. Additionally, attackers could leverage the compromised credentials to pivot into broader network environments, increasing the risk of lateral movement and further compromise. The critical severity and ease of exploitation mean that European entities using these devices face an urgent threat that could lead to significant operational disruption, reputational damage, and regulatory penalties if exploited.
Mitigation Recommendations
Given the absence of official patches at the time of reporting, European organizations should adopt immediate compensating controls. First, isolate affected Digiever DS-1200 devices on segmented networks with strict access controls to limit exposure to untrusted networks. Employ network-level filtering such as firewall rules or VLAN segmentation to restrict inbound access to the NVRs only to trusted management stations. Change default credentials on all connected cameras and the NVR itself to strong, unique passwords to reduce the risk of credential reuse. Monitor network traffic for unusual access patterns or attempts to retrieve configuration files. Implement intrusion detection/prevention systems (IDS/IPS) with signatures or heuristics targeting attempts to exploit this vulnerability. Where possible, disable remote management interfaces or restrict them via VPNs or secure tunnels. Maintain up-to-date asset inventories to identify all affected devices and prioritize remediation. Engage with Digiever for updates on patches or firmware upgrades and plan for rapid deployment once available. Finally, conduct regular security audits and penetration testing focused on physical security systems to detect and mitigate similar vulnerabilities proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- twcert
- Date Reserved
- 2025-09-11T11:42:41.676Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68c3f1b04d0b21a097082fd0
Added to database: 9/12/2025, 10:10:56 AM
Last enriched: 9/12/2025, 10:11:13 AM
Last updated: 9/12/2025, 3:55:49 PM
Views: 6
Related Threats
CVE-2025-43796: CWE-400 Uncontrolled Resource Consumption in Liferay Portal
HighCVE-2025-10322: Weak Password Recovery in Wavlink WL-WN578W2
MediumCVE-2025-58434: CWE-306: Missing Authentication for Critical Function in FlowiseAI Flowise
CriticalCVE-2025-7448: CWE-290 Authentication Bypass by Spoofing in silabs.com Wi-SUN Stack
HighCVE-2025-4235: CWE-497 Exposure of Sensitive System Information to an Unauthorized Control Sphere in Palo Alto Networks User-ID Credential Agent
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.