Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12592: CWE-1392 CWE-1392: Use of Default Credentials in Vivotek Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK

0
Critical
VulnerabilityCVE-2025-12592cvecve-2025-12592cwe-1392
Published: Wed Nov 19 2025 (11/19/2025, 12:30:32 UTC)
Source: CVE Database V5
Vendor/Project: Vivotek
Product: Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK

Description

Legacy Vivotek Device firmware uses default credetials for the root and user login accounts.

AI-Powered Analysis

AILast updated: 11/26/2025, 13:10:22 UTC

Technical Analysis

CVE-2025-12592 is a critical security vulnerability identified in legacy firmware versions of numerous Vivotek IP camera models, including but not limited to FD7131-VVTK, IP7133-VVTK, IP8131-VVTK, and VS7100-VVTK series. The root cause is the use of default credentials for both root and user login accounts, which remain unchanged in affected firmware versions ranging from 0100b through 0500b. This default credential usage allows unauthenticated remote attackers to access the device with full administrative privileges without requiring any user interaction, making exploitation straightforward and highly impactful. The vulnerability is classified under CWE-1392, indicating improper credential management. The CVSS 4.0 base score is 9.3 (critical), reflecting the vulnerability’s network attack vector, low attack complexity, no privileges or user interaction needed, and high impact on confidentiality, integrity, and availability. Exploiting this flaw could enable attackers to manipulate video feeds, disable cameras, pivot into internal networks, or exfiltrate sensitive surveillance data. Although no public exploits are currently reported, the widespread deployment of these devices in surveillance and security systems increases the risk of targeted attacks. The vulnerability affects a broad range of firmware versions, suggesting many devices remain unpatched or unsupported. The lack of official patches or mitigation guidance in the provided data underscores the need for immediate compensating controls. The vulnerability’s presence in critical security infrastructure devices makes it a high-priority threat for organizations relying on Vivotek cameras for monitoring and safety.

Potential Impact

For European organizations, the impact of CVE-2025-12592 is significant due to the widespread use of Vivotek IP cameras in public safety, transportation, government facilities, and private enterprises. Exploitation could lead to unauthorized surveillance, privacy violations, and disruption of security operations. Attackers gaining root access can manipulate or disable video streams, potentially blinding security monitoring systems and enabling physical or cyber attacks undetected. Additionally, compromised cameras can serve as entry points for lateral movement into corporate or critical infrastructure networks, risking broader data breaches or operational disruptions. The confidentiality of sensitive video data is at high risk, as is the integrity and availability of surveillance services. Given the critical nature of surveillance in European smart cities and critical infrastructure, this vulnerability could undermine public trust and safety. Organizations may face regulatory penalties under GDPR if personal data captured by cameras is exposed or misused. The lack of authentication and user interaction requirements makes this vulnerability especially dangerous in unattended or remote deployments common in Europe.

Mitigation Recommendations

1. Immediately change all default credentials on affected Vivotek devices to strong, unique passwords to prevent unauthorized access. 2. Check with Vivotek or authorized vendors for firmware updates or patches addressing this vulnerability; apply them promptly if available. 3. If no patches exist, consider device replacement or isolating vulnerable cameras on segmented networks with strict access controls and firewall rules to limit exposure. 4. Implement network monitoring and intrusion detection systems to identify unusual login attempts or device behavior indicative of compromise. 5. Disable remote management features if not required, or restrict access to trusted IP addresses only. 6. Regularly audit device configurations and credentials as part of security hygiene practices. 7. Employ multi-factor authentication for management interfaces if supported. 8. Educate staff responsible for surveillance infrastructure on the risks of default credentials and enforce policies to prevent their use. 9. Document and maintain an inventory of all Vivotek devices and firmware versions to prioritize remediation efforts. 10. Consider deploying network segmentation and zero trust principles around surveillance infrastructure to minimize lateral movement risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
larry_cashdollar
Date Reserved
2025-11-01T12:15:08.915Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691dbe8df37b5c9bf1714e87

Added to database: 11/19/2025, 12:56:45 PM

Last enriched: 11/26/2025, 1:10:22 PM

Last updated: 1/7/2026, 6:11:27 AM

Views: 93

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats