Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13187: Unprotected Storage of Credentials in Intelbras ICIP

0
Medium
VulnerabilityCVE-2025-13187cvecve-2025-13187
Published: Fri Nov 14 2025 (11/14/2025, 22:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Intelbras
Product: ICIP

Description

A security vulnerability has been detected in Intelbras ICIP 2.0.20. Affected is an unknown function of the file /xml/sistema/acessodeusuario.xml. Such manipulation of the argument NomeUsuario/SenhaAcess leads to unprotected storage of credentials. The attack may be launched remotely. The exploit has been disclosed publicly and may be used.

AI-Powered Analysis

AILast updated: 11/21/2025, 22:48:12 UTC

Technical Analysis

CVE-2025-13187 is a vulnerability identified in Intelbras ICIP version 2.0.20 involving unprotected storage of user credentials within the XML file located at /xml/sistema/acessodeusuario.xml. The vulnerability stems from improper handling and storage of the NomeUsuario (username) and SenhaAcess (password) fields, which are stored in a manner that does not adequately protect the confidentiality of these credentials. This flaw can be exploited remotely without requiring authentication or user interaction, as indicated by the CVSS vector AV:N/AC:L/AT:N/UI:N/PR:N. The vulnerability primarily impacts confidentiality, as attackers can retrieve sensitive credentials directly from the file system or via network access if the file is exposed. The CVSS 4.0 base score of 6.9 reflects a medium severity level, highlighting the ease of exploitation and the potential impact on confidentiality, while integrity and availability remain unaffected. No patches or fixes have been officially released at the time of publication, and no known exploits are reported in the wild, though public disclosure of exploit details increases the risk of future attacks. Intelbras ICIP is a product used in various security and communication applications, and the exposure of credentials could allow attackers to gain unauthorized access to systems, escalate privileges, and move laterally within affected networks. The vulnerability is particularly concerning for organizations that rely on Intelbras ICIP for critical operations, as compromised credentials could lead to broader security breaches.

Potential Impact

For European organizations, the unprotected storage of credentials in Intelbras ICIP 2.0.20 poses a significant risk of unauthorized access to sensitive systems. Attackers exploiting this vulnerability can obtain usernames and passwords remotely without authentication, potentially leading to account compromise, data breaches, and unauthorized control over affected devices or services. This can result in loss of confidentiality, disruption of operations, and increased risk of further exploitation such as lateral movement or privilege escalation. Sectors such as telecommunications, security services, and critical infrastructure that utilize Intelbras ICIP may face operational disruptions and reputational damage. Additionally, regulatory compliance risks arise under GDPR due to potential exposure of personal or sensitive data. The medium severity rating reflects that while the vulnerability does not directly impact system integrity or availability, the confidentiality breach alone can have cascading effects on organizational security posture.

Mitigation Recommendations

1. Immediately restrict access to the /xml/sistema/acessodeusuario.xml file by enforcing strict file system permissions and network access controls to prevent unauthorized retrieval of credential data. 2. Monitor network traffic and system logs for unusual access patterns or attempts to read the affected XML file remotely. 3. Implement network segmentation to isolate Intelbras ICIP devices from critical infrastructure and sensitive networks, limiting the attack surface. 4. Apply compensating controls such as multi-factor authentication (MFA) on systems that rely on Intelbras ICIP credentials to reduce the impact of credential compromise. 5. Regularly audit and rotate credentials stored or used by Intelbras ICIP to minimize the window of exposure. 6. Engage with Intelbras for timely updates and patches addressing this vulnerability, and plan for immediate deployment once available. 7. Educate IT and security teams about this vulnerability and ensure incident response plans include scenarios involving credential exposure from this product.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-11-14T13:02:51.954Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6917aae76c3a21c7a1852eea

Added to database: 11/14/2025, 10:19:19 PM

Last enriched: 11/21/2025, 10:48:12 PM

Last updated: 12/30/2025, 2:42:18 AM

Views: 79

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats