Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12351: CWE-639 Authorization Bypass Through User-Controlled Key in Honeywell S35 3M/5M/8M/Pinhole/Kit Camera

0
Medium
VulnerabilityCVE-2025-12351cvecve-2025-12351cwe-639cwe-668
Published: Mon Oct 27 2025 (10/27/2025, 15:03:57 UTC)
Source: CVE Database V5
Vendor/Project: Honeywell
Product: S35 3M/5M/8M/Pinhole/Kit Camera

Description

CVE-2025-12351 is an authorization bypass vulnerability in Honeywell S35 series cameras, allowing attackers with low privileges to escalate to admin-level access by exploiting a user-controlled key. This flaw affects multiple camera models including 3M, 5M, 8M, Pinhole, and Kit variants. The vulnerability does not require user interaction but demands network access and has a medium CVSS score of 6. 8. Exploitation could lead to full administrative control over the affected cameras, compromising confidentiality and integrity of video feeds and device configurations. Honeywell recommends updating to specific versions released in August 2025 to mitigate this issue. European organizations using these cameras in critical infrastructure or security-sensitive environments are at risk. Countries with high adoption of Honeywell security products and strategic critical infrastructure deployments are more likely to be targeted. Immediate patching and network segmentation are critical to reduce exposure.

AI-Powered Analysis

AILast updated: 11/03/2025, 16:12:02 UTC

Technical Analysis

CVE-2025-12351 identifies an authorization bypass vulnerability in Honeywell S35 series cameras, including 3M, 5M, 8M, Pinhole, and Kit models. The vulnerability arises from improper authorization checks related to a user-controlled key, classified under CWE-639 (Authorization Bypass Through User-Controlled Key) and CWE-668 (Exposure of Resource to Wrong Sphere). An attacker with low privileges (PR:L) can exploit this flaw remotely (AV:N) without user interaction (UI:N) but with high attack complexity (AC:H). Successful exploitation allows privilege escalation to administrative functions, granting control over camera settings, video streams, and potentially enabling further network reconnaissance or lateral movement. The CVSS v3.1 score is 6.8 (medium severity), reflecting high confidentiality and integrity impact but no availability impact. Honeywell has released patches in August 2025 for various S35 camera models: Pinhole/Kit (version 2025.08.28), AI Fisheye & Dual Sensor/Micro Dome/Full Color Eyeball & Bullet (2025.08.22), and Thermal Camera (2025.08.26). No known exploits are currently reported in the wild, but the vulnerability's nature makes it a significant risk for environments relying on these cameras for physical security. The vulnerability's exploitation could undermine surveillance integrity, allowing attackers to disable or manipulate video feeds or gain footholds in secured networks.

Potential Impact

For European organizations, this vulnerability poses a significant risk to physical security and operational integrity. Compromise of Honeywell S35 cameras could lead to unauthorized surveillance, tampering with video evidence, or disabling security monitoring, which is critical in sectors such as transportation, energy, government facilities, and corporate campuses. The ability to escalate privileges to admin level increases the risk of attackers pivoting into broader network environments, potentially leading to data breaches or disruption of critical services. Confidentiality and integrity of surveillance data are directly impacted, undermining trust in security infrastructure. Given the medium CVSS score and the high attack complexity, exploitation might be limited to skilled attackers with network access, but the consequences remain severe. Organizations in Europe with extensive deployments of Honeywell cameras in sensitive locations must prioritize remediation to avoid potential espionage, sabotage, or compliance violations under regulations like GDPR.

Mitigation Recommendations

1. Immediately update all affected Honeywell S35 cameras to the vendor-recommended versions released in August 2025 to patch the authorization bypass vulnerability. 2. Implement strict network segmentation to isolate security cameras from general corporate networks, limiting attacker lateral movement if a device is compromised. 3. Enforce strong access controls and monitoring on camera management interfaces, including multi-factor authentication where supported. 4. Regularly audit camera firmware versions and configurations to ensure compliance with security policies. 5. Deploy network intrusion detection systems (NIDS) to monitor for anomalous traffic patterns targeting camera devices. 6. Limit exposure of camera management ports to the internet or untrusted networks. 7. Educate security teams on this specific vulnerability to recognize potential exploitation attempts. 8. Maintain an incident response plan that includes compromised physical security devices to quickly isolate and remediate affected assets.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Honeywell
Date Reserved
2025-10-27T14:59:57.822Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ff8ac4ba6dffc5e2fe0fd8

Added to database: 10/27/2025, 3:07:48 PM

Last enriched: 11/3/2025, 4:12:02 PM

Last updated: 12/14/2025, 4:45:43 PM

Views: 237

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats