Skip to main content

CVE-2025-30124: n/a

Critical
VulnerabilityCVE-2025-30124cvecve-2025-30124
Published: Mon Jul 28 2025 (07/28/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered on Marbella KR8s Dashcam FF 2.0.8 devices. When a new SD card is inserted into the dashcam, the existing password is written onto the SD card in cleartext automatically. An attacker with temporary access to the dashcam can switch the SD card to steal this password.

AI-Powered Analysis

AILast updated: 08/05/2025, 00:55:42 UTC

Technical Analysis

CVE-2025-30124 is a critical security vulnerability affecting Marbella KR8s Dashcam FF version 2.0.8 devices. The vulnerability arises from the device's insecure handling of user credentials when a new SD card is inserted. Specifically, the dashcam automatically writes the existing user password onto the newly inserted SD card in cleartext without any encryption or protection. This behavior exposes the password to anyone who gains temporary physical access to the dashcam and can swap the SD card. An attacker can then retrieve the password by simply reading the contents of the SD card, potentially compromising the device and any associated accounts or services that use the same credentials. The vulnerability is classified under CWE-312 (Cleartext Storage of Sensitive Information), indicating poor security practices in credential storage. The CVSS v3.1 base score is 9.8, reflecting a critical severity due to the vulnerability's characteristics: it requires no privileges or user interaction, can be exploited remotely via network access (AV:N), and results in high confidentiality, integrity, and availability impacts. Although no known exploits are currently reported in the wild, the ease of exploitation and the sensitive nature of the data exposed make this a significant threat. The lack of available patches or mitigations from the vendor further exacerbates the risk. Dashcams are often used in vehicles for security and evidence collection, and compromise of these devices could lead to unauthorized access to recorded footage, manipulation of data, or broader network compromise if the device is connected to other systems.

Potential Impact

For European organizations, especially those in transportation, logistics, law enforcement, and fleet management sectors, this vulnerability poses a substantial risk. Compromise of dashcam credentials could lead to unauthorized access to sensitive video footage, potentially exposing personal data protected under GDPR, such as images of individuals, license plates, and locations. This could result in privacy violations, regulatory fines, and reputational damage. Furthermore, if the dashcams are integrated into broader vehicle telematics or corporate networks, attackers could leverage the compromised credentials to pivot into internal systems, causing operational disruptions or data breaches. The critical severity and ease of exploitation mean that attackers with brief physical access—such as during vehicle maintenance or parking—could extract passwords without detection. This risk is heightened in shared or public vehicle environments common in European urban centers. Additionally, the lack of authentication or user interaction required for exploitation increases the threat surface. Organizations relying on these dashcams must consider the potential for espionage, sabotage, or data theft, which could impact business continuity and compliance obligations.

Mitigation Recommendations

Given the absence of vendor patches, European organizations should implement immediate compensating controls. First, restrict physical access to vehicles equipped with Marbella KR8s Dashcam FF devices to trusted personnel only, employing secure parking and surveillance measures. Secondly, regularly inspect and monitor SD cards for unauthorized removal or replacement. Organizations should consider disabling automatic writing of passwords to SD cards if device settings allow or replacing the dashcams with models that follow secure credential management practices. Network segmentation is critical; isolate dashcam devices from sensitive internal networks to limit lateral movement if compromised. Employ endpoint detection and response (EDR) tools to monitor for unusual device behavior or unauthorized access attempts. Additionally, enforce strong, unique passwords for dashcam devices and change them frequently to reduce the window of exposure. Educate staff about the risks of physical device tampering and implement strict policies for device handling. Finally, maintain an inventory of affected devices and track firmware updates or vendor advisories for future patches.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-03-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68878682ad5a09ad00842ff1

Added to database: 7/28/2025, 2:17:38 PM

Last enriched: 8/5/2025, 12:55:42 AM

Last updated: 9/8/2025, 10:50:21 PM

Views: 28

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats