Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31702: CWE-732 Incorrect Permission Assignment for Critical Resource in Dahua IPC

0
Medium
VulnerabilityCVE-2025-31702cvecve-2025-31702cwe-732
Published: Wed Oct 15 2025 (10/15/2025, 05:53:35 UTC)
Source: CVE Database V5
Vendor/Project: Dahua
Product: IPC

Description

A vulnerability exists in certain Dahua embedded products. Third-party malicious attacker with obtained normal user credentials could exploit the vulnerability to access certain data which are restricted to admin privileges, such as system-sensitive files through specific HTTP request. This may cause tampering with admin password, leading to privilege escalation. Systems with only admin account are not affected.

AI-Powered Analysis

AILast updated: 10/15/2025, 06:07:28 UTC

Technical Analysis

CVE-2025-31702 is a vulnerability in certain Dahua IPC (Internet Protocol Camera) embedded products, specifically models from the IPC-1XXX, IPC-2XXX, IPC-WX, and IPC-ECXX series with firmware built prior to July 1, 2025. The root cause is an incorrect permission assignment (CWE-732) that allows a user with normal credentials to bypass access controls and retrieve sensitive system files normally restricted to admin users. Attackers exploit this by sending specially crafted HTTP requests to the device, enabling them to read data that should be protected. This unauthorized access can be leveraged to tamper with the administrator password, resulting in privilege escalation from a low-privilege user to an admin-level user. The vulnerability does not affect systems configured with only an admin account, as no lower privilege user exists to exploit the flaw. The CVSS v3.1 score is 6.8 (medium severity), reflecting a network attack vector with high impact on confidentiality and integrity but no impact on availability. The attack complexity is high, requiring some conditions to be met, and no user interaction is needed. No public exploits have been reported yet, but the vulnerability poses a significant risk to organizations relying on these Dahua IPC devices for security surveillance. The vulnerability highlights the importance of proper permission assignment in embedded device firmware to prevent unauthorized privilege escalation.

Potential Impact

For European organizations, this vulnerability poses a risk to the confidentiality and integrity of surveillance systems that use affected Dahua IPC models. Unauthorized access to admin-level functions could allow attackers to manipulate camera configurations, disable security monitoring, or exfiltrate sensitive video footage and system data. This could lead to breaches of physical security, privacy violations, and regulatory non-compliance (e.g., GDPR). Organizations in critical infrastructure sectors, government facilities, and enterprises relying on Dahua IPCs for perimeter security are particularly at risk. The ability to escalate privileges from a normal user to admin could enable persistent unauthorized access and lateral movement within networks. Although no availability impact is indicated, the compromise of surveillance integrity can have severe operational consequences. The medium severity score suggests a moderate but actionable threat, especially given the widespread use of Dahua products in Europe.

Mitigation Recommendations

European organizations should immediately inventory their Dahua IPC devices to identify affected models and firmware versions. Since no patch links are currently provided, organizations should contact Dahua support for firmware updates or security advisories addressing CVE-2025-31702. In the interim, restrict network access to IPC devices by implementing network segmentation and firewall rules to limit HTTP access to trusted management hosts only. Enforce strong credential policies and monitor for unusual authentication attempts or privilege escalations. Disable or remove any non-admin user accounts if possible, as systems with only admin accounts are not vulnerable. Employ intrusion detection systems to flag suspicious HTTP requests targeting IPC devices. Regularly review device logs for signs of exploitation attempts. Finally, plan for timely firmware upgrades once patches become available and validate the security posture of all embedded devices in the environment.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
dahua
Date Reserved
2025-04-01T05:57:11.782Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68ef39aeb5560353b8eac1ab

Added to database: 10/15/2025, 6:05:34 AM

Last enriched: 10/15/2025, 6:07:28 AM

Last updated: 10/15/2025, 11:56:38 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats