CVE-2025-35451: CWE-798 Use of Hard-coded Credentials in PTZOptics PT12X-SE-xx-G3
PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.
AI Analysis
Technical Summary
CVE-2025-35451 is a critical vulnerability affecting PTZOptics PT12X-SE-xx-G3 pan-tilt-zoom cameras, which are based on the ValueHD platform. The core issue is the presence of hard-coded, default administrative credentials embedded in the device firmware. These credentials are static, cannot be changed by the user, and are easily crackable. Compounding the risk, many of these cameras have SSH and telnet services enabled and listening on all network interfaces, exposing them to remote access attempts. Since the passwords cannot be altered and the SSH/telnet services cannot be disabled by the user, attackers can gain unauthorized administrative access remotely without any user interaction or prior authentication. This grants full control over the device, enabling attackers to manipulate camera functions, intercept video streams, pivot within the network, or launch further attacks. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a well-known security anti-pattern that severely undermines device security. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's ease of exploitation (network attack vector, no privileges or user interaction required) and its high impact on confidentiality, integrity, and availability. No patches are currently available, and no known exploits have been reported in the wild yet, but the risk of exploitation is high given the nature of the flaw and the exposure of management services.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for sectors relying on PTZOptics PT12X-SE-xx-G3 cameras for security, surveillance, or operational monitoring. Unauthorized access to these cameras can lead to severe confidentiality breaches, including unauthorized video surveillance and data leakage. Integrity of camera settings and video streams can be compromised, allowing attackers to manipulate footage or disable cameras, impacting physical security and operational continuity. Availability is also at risk, as attackers could disrupt camera functionality or use compromised devices as entry points for lateral movement within corporate or critical infrastructure networks. This is particularly concerning for organizations in government, transportation, manufacturing, and critical infrastructure sectors where surveillance cameras are integral to security operations. The inability to change credentials or disable remote access services exacerbates the risk, making mitigation challenging and increasing the likelihood of successful attacks if devices are exposed to untrusted networks.
Mitigation Recommendations
Given the lack of patches or firmware updates, European organizations should implement compensating controls immediately. First, isolate affected cameras on dedicated VLANs or network segments with strict access controls and firewall rules limiting inbound traffic to trusted management hosts only. Disable remote access to these devices from the internet or untrusted networks. Employ network-level authentication and monitoring to detect anomalous access attempts to SSH or telnet services. Where possible, replace affected devices with models that allow credential customization and service configuration. If replacement is not feasible, consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting these cameras. Regularly audit network device inventories to identify and track vulnerable cameras. Engage with PTZOptics or ValueHD vendors for updates or firmware patches and subscribe to vulnerability advisories for timely remediation. Finally, implement physical security controls to prevent unauthorized local access to the devices.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-35451: CWE-798 Use of Hard-coded Credentials in PTZOptics PT12X-SE-xx-G3
Description
PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.
AI-Powered Analysis
Technical Analysis
CVE-2025-35451 is a critical vulnerability affecting PTZOptics PT12X-SE-xx-G3 pan-tilt-zoom cameras, which are based on the ValueHD platform. The core issue is the presence of hard-coded, default administrative credentials embedded in the device firmware. These credentials are static, cannot be changed by the user, and are easily crackable. Compounding the risk, many of these cameras have SSH and telnet services enabled and listening on all network interfaces, exposing them to remote access attempts. Since the passwords cannot be altered and the SSH/telnet services cannot be disabled by the user, attackers can gain unauthorized administrative access remotely without any user interaction or prior authentication. This grants full control over the device, enabling attackers to manipulate camera functions, intercept video streams, pivot within the network, or launch further attacks. The vulnerability is classified under CWE-798 (Use of Hard-coded Credentials), which is a well-known security anti-pattern that severely undermines device security. The CVSS v3.1 score is 9.8 (critical), reflecting the vulnerability's ease of exploitation (network attack vector, no privileges or user interaction required) and its high impact on confidentiality, integrity, and availability. No patches are currently available, and no known exploits have been reported in the wild yet, but the risk of exploitation is high given the nature of the flaw and the exposure of management services.
Potential Impact
For European organizations, this vulnerability poses a significant risk especially for sectors relying on PTZOptics PT12X-SE-xx-G3 cameras for security, surveillance, or operational monitoring. Unauthorized access to these cameras can lead to severe confidentiality breaches, including unauthorized video surveillance and data leakage. Integrity of camera settings and video streams can be compromised, allowing attackers to manipulate footage or disable cameras, impacting physical security and operational continuity. Availability is also at risk, as attackers could disrupt camera functionality or use compromised devices as entry points for lateral movement within corporate or critical infrastructure networks. This is particularly concerning for organizations in government, transportation, manufacturing, and critical infrastructure sectors where surveillance cameras are integral to security operations. The inability to change credentials or disable remote access services exacerbates the risk, making mitigation challenging and increasing the likelihood of successful attacks if devices are exposed to untrusted networks.
Mitigation Recommendations
Given the lack of patches or firmware updates, European organizations should implement compensating controls immediately. First, isolate affected cameras on dedicated VLANs or network segments with strict access controls and firewall rules limiting inbound traffic to trusted management hosts only. Disable remote access to these devices from the internet or untrusted networks. Employ network-level authentication and monitoring to detect anomalous access attempts to SSH or telnet services. Where possible, replace affected devices with models that allow credential customization and service configuration. If replacement is not feasible, consider deploying network intrusion detection/prevention systems (IDS/IPS) tuned to detect exploitation attempts targeting these cameras. Regularly audit network device inventories to identify and track vulnerable cameras. Engage with PTZOptics or ValueHD vendors for updates or firmware patches and subscribe to vulnerability advisories for timely remediation. Finally, implement physical security controls to prevent unauthorized local access to the devices.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:57:14.282Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb230f3933eaf832a4e5f2
Added to database: 9/5/2025, 5:51:11 PM
Last enriched: 9/5/2025, 5:51:29 PM
Last updated: 9/5/2025, 8:04:45 PM
Views: 4
Related Threats
CVE-2025-10043: External Control of File Name or Path in Red Hat Red Hat Build of Keycloak
LowCVE-2025-10026: Cross Site Scripting in itsourcecode POS Point of Sale System
MediumCVE-2025-2190: CWE-297 Improper Validation of Certificate with Host Mismatch in TECNO com.transsnet.store
HighCVE-2025-58280: CWE-1321 Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in Huawei HarmonyOS
HighCVE-2025-0289: CWE-1287: Improper Validation of Specified Type of Input in Paragon Software Migrate OS to SSD
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.