Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11942: Missing Authentication in 70mai X200

0
Medium
VulnerabilityCVE-2025-11942cvecve-2025-11942
Published: Sun Oct 19 2025 (10/19/2025, 16:02:07 UTC)
Source: CVE Database V5
Vendor/Project: 70mai
Product: X200

Description

A flaw has been found in 70mai X200 up to 20251010. Affected is an unknown function of the component Pairing. Executing manipulation can lead to missing authentication. It is possible to launch the attack remotely. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 10/27/2025, 01:21:16 UTC

Technical Analysis

CVE-2025-11942 identifies a security vulnerability in the 70mai X200 dashcam firmware version up to 20251010, specifically within an unspecified function related to the device's pairing process. The core issue is missing authentication controls, which means that an attacker can remotely interact with the device without any credentials or user interaction. This lack of authentication allows an adversary to manipulate the device’s pairing mechanism, potentially enabling unauthorized access or control over the device. The vulnerability is remotely exploitable over the network, with no privileges required, making it highly accessible to attackers. The CVSS 4.0 base score is 6.9 (medium severity), reflecting the network attack vector, low attack complexity, and no need for authentication or user interaction. The impact on confidentiality, integrity, and availability is rated low individually but collectively significant enough to warrant concern. The vendor 70mai has not responded to disclosure attempts, and no patches or mitigations have been officially released, though exploit code is publicly available, increasing the risk of exploitation. This vulnerability could allow attackers to intercept or manipulate data streams, disrupt device operations, or use the device as a foothold into broader networks. The lack of authentication in pairing is a critical design flaw that undermines the security of the device and any connected systems relying on it.

Potential Impact

For European organizations, especially those utilizing 70mai X200 dashcams in fleet management, logistics, or automotive sectors, this vulnerability poses risks of unauthorized access to video feeds, manipulation of device settings, or disruption of device functionality. Confidentiality could be compromised if attackers intercept or alter recorded footage or metadata. Integrity risks arise if attackers modify device configurations or data streams, potentially leading to falsified evidence or operational errors. Availability impact is lower but possible if attackers disrupt device pairing or connectivity. Given the exploit is remotely executable without authentication, attackers could leverage this vulnerability to gain persistent access or pivot into internal networks, especially if devices are connected to corporate infrastructure. The absence of vendor patches means organizations must rely on network-level controls and monitoring to mitigate risks. Additionally, the public availability of exploit code increases the likelihood of opportunistic attacks targeting vulnerable devices in Europe.

Mitigation Recommendations

1. Immediately isolate 70mai X200 devices from untrusted networks, especially public or guest Wi-Fi, to reduce exposure to remote attacks. 2. Disable or restrict the pairing feature if possible, or limit it to secure, authenticated environments. 3. Implement strict network segmentation and firewall rules to control traffic to and from these devices, allowing only trusted management stations. 4. Monitor network traffic for unusual pairing attempts or unauthorized access patterns targeting the devices. 5. Use VPNs or secure tunnels for remote access to the devices to add an authentication layer externally. 6. Maintain an inventory of all 70mai X200 devices and track firmware versions to identify vulnerable units. 7. Engage with the vendor or community for updates or unofficial patches and apply them promptly once available. 8. Educate staff about the risks of connecting these devices to insecure networks and enforce policies to prevent unauthorized device usage. 9. Consider alternative devices with better security postures if mitigation is not feasible in the short term.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-10-19T02:39:07.895Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f50e6f33dbe6918a21d6bd

Added to database: 10/19/2025, 4:14:39 PM

Last enriched: 10/27/2025, 1:21:16 AM

Last updated: 12/4/2025, 6:17:42 PM

Views: 123

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats