Skip to main content

CVE-2025-35451: CWE-798 Use of Hard-coded Credentials in PTZOptics PT12X-SE-xx-G3

Critical
VulnerabilityCVE-2025-35451cvecve-2025-35451cwe-798
Published: Fri Sep 05 2025 (09/05/2025, 17:43:53 UTC)
Source: CVE Database V5
Vendor/Project: PTZOptics
Product: PT12X-SE-xx-G3

Description

PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.

AI-Powered Analysis

AILast updated: 09/05/2025, 17:51:29 UTC

Technical Analysis

CVE-2025-35451 is a critical vulnerability affecting PTZOptics PT12X-SE-xx-G3 pan-tilt-zoom cameras, which are based on the ValueHD platform. The core issue is the presence of hard-coded, default administrative credentials embedded in the device firmware. These credentials are static, cannot be changed by the user, and are easily crackable. Compounding the risk, many of these cameras have SSH and telnet services enabled and listening on all network interfaces, exposing them to remote access attempts. Since the passwords cannot be altered and the SSH/telnet services cannot be disabled by the user, attackers can gain unauthorized administrative access remotely without any user interaction or prior authentication. This grants full control over the device, enabling attackers to manipulate camera functions, intercept video streams, pivot within the network, or launch further attacks. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a well-known security anti-pattern that severely undermines device security. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's ease of exploitation (network attack vector, no privileges or user interaction required) and its high impact on confidentiality, integrity, and availability. No patches are currently available, and no known exploits have been reported in the wild yet, but the risk of exploitation is high given the nature of the flaw and the exposure of management services.

Potential Impact

For European organizations, this vulnerability poses a significant risk especially for sectors relying on PTZOptics PT12X-SE-xx-G3 cameras for security, surveillance, or operational monitoring. Unauthorized access to these cameras can lead to severe confidentiality breaches, including unauthorized video surveillance and data leakage. Integrity of camera settings and video streams can be compromised, allowing attackers to manipulate footage or disable cameras, impacting physical security and operational continuity. Availability is also at risk, as attackers could disrupt camera functionality or use compromised devices as entry points for lateral movement within corporate or critical infrastructure networks. This is particularly concerning for organizations in government, transportation, manufacturing, and critical infrastructure sectors where surveillance cameras are integral to security operations. The inability to change credentials or disable remote access services exacerbates the risk, making mitigation challenging and increasing the likelihood of successful attacks if devices are exposed to untrusted networks.

Mitigation Recommendations

Given the lack of patches or firmware updates, European organizations should implement compensating controls immediately. First, isolate affected cameras on dedicated VLANs or network segments with strict access controls and firewall rules limiting inbound traffic to trusted management hosts only. Disable remote access to these devices from the internet or untrusted networks. Employ network-level authentication and monitoring to detect anomalous access attempts to SSH or telnet services. Where possible, replace affected devices with models that allow credential customization and service configuration. If replacement is not feasible, consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting these cameras. Regularly audit network device inventories to identify and track vulnerable cameras. Engage with PTZOptics or ValueHD vendors for updates or firmware patches and subscribe to vulnerability advisories for timely remediation. Finally, implement physical security controls to prevent unauthorized local access to the devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
cisa-cg
Date Reserved
2025-04-15T20:57:14.282Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68bb230f3933eaf832a4e5f2

Added to database: 9/5/2025, 5:51:11 PM

Last enriched: 9/5/2025, 5:51:29 PM

Last updated: 9/5/2025, 8:04:45 PM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats