Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14746: Improper Authentication in Ningyuanda TC155

0
Medium
VulnerabilityCVE-2025-14746cvecve-2025-14746
Published: Tue Dec 16 2025 (12/16/2025, 02:02:06 UTC)
Source: CVE Database V5
Vendor/Project: Ningyuanda
Product: TC155

Description

A vulnerability has been found in Ningyuanda TC155 57.0.2.0. The affected element is an unknown function of the component RTSP Live Video Stream Endpoint. Such manipulation leads to improper authentication. The attack must be carried out from within the local network. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 12/23/2025, 04:47:53 UTC

Technical Analysis

CVE-2025-14746 identifies an improper authentication vulnerability in the Ningyuanda TC155 device, version 57.0.2.0, specifically within the RTSP Live Video Stream Endpoint component. The flaw arises from an unknown function that fails to enforce proper authentication, allowing an attacker with local network access to bypass authentication mechanisms and access live video streams without credentials. The vulnerability does not require user interaction, privileges, or authentication, and the attack complexity is low. The CVSS 4.0 vector (AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:P) reflects that the attack must be performed from the local network (AV:A), has low complexity (AC:L), requires no authentication (PR:N), no user interaction (UI:N), and impacts confidentiality to a limited extent (VC:L) but not integrity or availability. The vendor has not responded to disclosure requests, and no patches are currently available. Although no known exploits in the wild have been reported, public disclosure of exploit details increases the risk of exploitation by local attackers or insiders. The vulnerability primarily threatens confidentiality by exposing live video streams to unauthorized viewers, potentially compromising sensitive surveillance data. The lack of authentication enforcement could also facilitate lateral movement within networks. The attack surface is limited to local network access, which reduces remote exploitation risk but highlights the importance of internal network security controls.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to confidentiality, as unauthorized actors on the local network could access live video streams from Ningyuanda TC155 devices. This could lead to exposure of sensitive surveillance footage, undermining physical security and privacy compliance obligations such as GDPR. Critical infrastructure sectors (e.g., transportation, energy, government facilities) that deploy these devices for monitoring could face espionage or sabotage risks if attackers gain unauthorized video access. The vulnerability does not directly affect system integrity or availability, but unauthorized access could facilitate further internal attacks or reconnaissance. Since exploitation requires local network access, organizations with segmented networks and strict internal access controls may reduce risk, but those with flat or poorly segmented networks are more vulnerable. The absence of vendor patches and the public disclosure of exploit details increase the urgency for European entities to implement compensating controls. Failure to address this vulnerability could result in regulatory penalties, reputational damage, and operational security risks.

Mitigation Recommendations

1. Implement strict network segmentation to isolate Ningyuanda TC155 devices from general user networks, limiting local network access to trusted personnel only. 2. Enforce strong internal access controls and authentication mechanisms on network segments hosting these devices to prevent unauthorized lateral movement. 3. Monitor internal network traffic for unusual RTSP connection attempts or unauthorized access patterns to detect potential exploitation attempts. 4. Disable or restrict RTSP streaming services if not required or replace with more secure alternatives supporting robust authentication. 5. Engage with Ningyuanda or authorized vendors to request patches or firmware updates addressing the vulnerability. 6. If possible, deploy host-based intrusion detection systems on devices or network gateways to identify exploitation attempts. 7. Conduct regular security audits and penetration testing focusing on internal network vulnerabilities and device configurations. 8. Educate internal staff about the risks of local network attacks and enforce strict policies on device access and network usage. 9. Maintain up-to-date asset inventories to quickly identify affected devices and prioritize remediation efforts. 10. Consider deploying network access control (NAC) solutions to enforce device authentication and limit network access to authorized endpoints only.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-15T20:39:05.047Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6940c7c9d9bcdf3f3d1a980a

Added to database: 12/16/2025, 2:45:29 AM

Last enriched: 12/23/2025, 4:47:53 AM

Last updated: 2/7/2026, 10:41:04 AM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats