Skip to main content

CVE-2025-26468: CWE-306 in CyberData 011209 SIP Emergency Intercom

High
VulnerabilityCVE-2025-26468cvecve-2025-26468cwe-306
Published: Mon Jun 09 2025 (06/09/2025, 22:07:44 UTC)
Source: CVE Database V5
Vendor/Project: CyberData
Product: 011209 SIP Emergency Intercom

Description

CyberData  011209 Intercom exposes features that could allow an unauthenticated to gain access and cause a denial-of-service condition or system disruption.

AI-Powered Analysis

AILast updated: 07/10/2025, 23:36:07 UTC

Technical Analysis

CVE-2025-26468 is a high-severity vulnerability (CVSS 7.5) affecting the CyberData 011209 SIP Emergency Intercom device. The root cause is identified as CWE-306, which corresponds to Missing Authentication for Critical Function. This means that certain features or functions of the intercom device are exposed without requiring authentication, allowing an unauthenticated attacker to interact with the device. Specifically, an attacker can exploit this lack of authentication to cause a denial-of-service (DoS) condition or disrupt the system's normal operation. The vulnerability is remotely exploitable over the network (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), making it relatively easy to exploit. However, the impact is limited to availability (A:H) with no direct confidentiality or integrity compromise indicated. The device in question is a SIP Emergency Intercom, which is typically used in critical communication scenarios such as emergency notifications and public safety announcements. The absence of authentication on critical functions could allow attackers to disable or disrupt emergency communication capabilities, potentially delaying or preventing critical alerts. No patches or known exploits in the wild have been reported as of the publication date (June 2025). The vulnerability was reserved in March 2025 and published in June 2025, indicating recent discovery and disclosure. The lack of authentication on critical functions in a security-sensitive device highlights a significant design flaw that could be leveraged to degrade operational availability in environments relying on these intercoms for emergency communication.

Potential Impact

For European organizations, the impact of this vulnerability could be significant, especially for entities relying on CyberData 011209 SIP Emergency Intercoms in safety-critical environments such as hospitals, public transportation hubs, universities, government buildings, and industrial facilities. Disruption or denial of service of emergency intercoms could delay emergency response, cause safety hazards, and undermine trust in safety infrastructure. Since the vulnerability allows unauthenticated remote exploitation, attackers could target these devices from outside the network perimeter if exposed or from within compromised internal networks. This could lead to localized or widespread communication outages during emergencies. The impact is primarily on availability, but the indirect consequences could include safety risks and regulatory compliance issues under European safety and security regulations. Organizations in sectors with stringent safety requirements and critical infrastructure protection mandates would be particularly vulnerable to operational disruptions caused by this flaw.

Mitigation Recommendations

Given the absence of available patches, European organizations should implement immediate compensating controls. These include: 1) Network segmentation and strict access controls to isolate the intercom devices from untrusted networks and limit access only to authorized management systems. 2) Deploy firewall rules or network ACLs to restrict SIP traffic to and from the intercom devices, allowing only trusted IP addresses and ports. 3) Monitor network traffic for anomalous SIP requests or unusual patterns targeting the intercom devices to detect potential exploitation attempts. 4) If possible, disable or restrict unused features on the intercom devices to reduce the attack surface. 5) Engage with CyberData for firmware updates or patches and plan for timely deployment once available. 6) Conduct regular security assessments and penetration tests focusing on VoIP and SIP infrastructure to identify similar weaknesses. 7) Implement incident response plans that include scenarios involving communication system disruptions to maintain operational resilience. These targeted mitigations go beyond generic advice by focusing on network-level controls, monitoring, and operational preparedness specific to SIP emergency intercom systems.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-03-26T16:22:34.674Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68487f531b0bd07c39389fb5

Added to database: 6/10/2025, 6:54:11 PM

Last enriched: 7/10/2025, 11:36:07 PM

Last updated: 8/3/2025, 6:25:25 PM

Views: 15

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats