CVE-2025-35451: CWE-798 Use of Hard-coded Credentials in PTZOptics PT12X-SE-xx-G3
PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.
AI Analysis
Technical Summary
CVE-2025-35451 is a critical vulnerability affecting PTZOptics PT12X-SE-xx-G3 pan-tilt-zoom (PTZ) cameras, which are based on ValueHD technology. The core issue is the use of hard-coded, default administrative credentials embedded in the device firmware. These credentials are static, cannot be changed by the user, and are easily crackable. Furthermore, many of these cameras have SSH and telnet services enabled and listening on all network interfaces by default. Neither the SSH nor the telnet services can be disabled by the user, which significantly increases the attack surface. This vulnerability falls under CWE-798 (Use of Hard-coded Credentials), which is a well-known security weakness that allows attackers to gain unauthorized access to devices. The CVSS v3.1 score of 9.8 (critical) reflects the high impact and ease of exploitation: the vulnerability can be exploited remotely over the network without any authentication or user interaction, leading to full compromise of confidentiality, integrity, and availability of the device. Attackers who successfully exploit this vulnerability can take full control of the camera, potentially intercept video streams, manipulate camera controls, or use the device as a foothold for lateral movement within a network. The inability to change credentials or disable remote access services means that mitigation options are limited and require network-level controls or device replacement. No patches or firmware updates are currently available, and no known exploits are reported in the wild yet, but the severity and ease of exploitation make this a significant threat to organizations using these cameras.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those deploying PTZOptics PT12X-SE-xx-G3 cameras in sensitive environments such as corporate offices, government buildings, critical infrastructure, and public venues. Compromise of these cameras can lead to unauthorized surveillance, privacy violations, and exposure of sensitive video feeds. Attackers could also leverage compromised cameras as entry points into internal networks, facilitating further attacks such as data exfiltration, ransomware deployment, or disruption of operations. The persistent presence of SSH and telnet services with unchangeable credentials increases the likelihood of automated scanning and exploitation by threat actors. Given the criticality of video surveillance in security operations, any disruption or manipulation could degrade situational awareness and incident response capabilities. Additionally, the inability to disable these services or change credentials complicates incident response and remediation efforts, potentially leading to prolonged exposure and increased operational risk.
Mitigation Recommendations
Since no patches or firmware updates are currently available to address the hard-coded credentials or disable remote access services, European organizations should implement compensating controls immediately. These include: 1) Network segmentation: Isolate PTZOptics cameras on dedicated VLANs or network segments with strict access controls to limit exposure to trusted management hosts only. 2) Firewall rules: Block inbound and outbound SSH and telnet traffic to and from the cameras at network perimeter and internal firewalls, allowing only authorized management IP addresses if remote access is necessary. 3) Network monitoring: Deploy intrusion detection/prevention systems (IDS/IPS) to detect and alert on suspicious SSH/telnet connection attempts or brute force activities targeting these devices. 4) Device replacement: Plan for the replacement of vulnerable cameras with models that allow credential management and service configuration. 5) Physical security: Ensure physical access to cameras is restricted to prevent local exploitation or tampering. 6) Vendor engagement: Engage with PTZOptics and ValueHD to demand firmware updates or patches that allow credential changes and service disabling. 7) Incident response readiness: Prepare for potential compromise by establishing monitoring and response procedures specific to camera devices. These mitigations go beyond generic advice by focusing on network-level controls and operational strategies tailored to the unique constraints of this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-35451: CWE-798 Use of Hard-coded Credentials in PTZOptics PT12X-SE-xx-G3
Description
PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras use hard-coded, default administrative credentials. The passwords can readily be cracked. Many cameras have SSH or telnet listening on all interfaces. The passwords cannot be changed by the user, nor can the SSH or telnet service be disabled by the user.
AI-Powered Analysis
Technical Analysis
CVE-2025-35451 is a critical vulnerability affecting PTZOptics PT12X-SE-xx-G3 pan-tilt-zoom (PTZ) cameras, which are based on ValueHD technology. The core issue is the use of hard-coded, default administrative credentials embedded in the device firmware. These credentials are static, cannot be changed by the user, and are easily crackable. Furthermore, many of these cameras have SSH and telnet services enabled and listening on all network interfaces by default. Neither the SSH nor the telnet services can be disabled by the user, which significantly increases the attack surface. This vulnerability falls under CWE-798 (Use of Hard-coded Credentials), which is a well-known security weakness that allows attackers to gain unauthorized access to devices. The CVSS v3.1 score of 9.8 (critical) reflects the high impact and ease of exploitation: the vulnerability can be exploited remotely over the network without any authentication or user interaction, leading to full compromise of confidentiality, integrity, and availability of the device. Attackers who successfully exploit this vulnerability can take full control of the camera, potentially intercept video streams, manipulate camera controls, or use the device as a foothold for lateral movement within a network. The inability to change credentials or disable remote access services means that mitigation options are limited and require network-level controls or device replacement. No patches or firmware updates are currently available, and no known exploits are reported in the wild yet, but the severity and ease of exploitation make this a significant threat to organizations using these cameras.
Potential Impact
For European organizations, this vulnerability poses a substantial risk, especially for those deploying PTZOptics PT12X-SE-xx-G3 cameras in sensitive environments such as corporate offices, government buildings, critical infrastructure, and public venues. Compromise of these cameras can lead to unauthorized surveillance, privacy violations, and exposure of sensitive video feeds. Attackers could also leverage compromised cameras as entry points into internal networks, facilitating further attacks such as data exfiltration, ransomware deployment, or disruption of operations. The persistent presence of SSH and telnet services with unchangeable credentials increases the likelihood of automated scanning and exploitation by threat actors. Given the criticality of video surveillance in security operations, any disruption or manipulation could degrade situational awareness and incident response capabilities. Additionally, the inability to disable these services or change credentials complicates incident response and remediation efforts, potentially leading to prolonged exposure and increased operational risk.
Mitigation Recommendations
Since no patches or firmware updates are currently available to address the hard-coded credentials or disable remote access services, European organizations should implement compensating controls immediately. These include: 1) Network segmentation: Isolate PTZOptics cameras on dedicated VLANs or network segments with strict access controls to limit exposure to trusted management hosts only. 2) Firewall rules: Block inbound and outbound SSH and telnet traffic to and from the cameras at network perimeter and internal firewalls, allowing only authorized management IP addresses if remote access is necessary. 3) Network monitoring: Deploy intrusion detection/prevention systems (IDS/IPS) to detect and alert on suspicious SSH/telnet connection attempts or brute force activities targeting these devices. 4) Device replacement: Plan for the replacement of vulnerable cameras with models that allow credential management and service configuration. 5) Physical security: Ensure physical access to cameras is restricted to prevent local exploitation or tampering. 6) Vendor engagement: Engage with PTZOptics and ValueHD to demand firmware updates or patches that allow credential changes and service disabling. 7) Incident response readiness: Prepare for potential compromise by establishing monitoring and response procedures specific to camera devices. These mitigations go beyond generic advice by focusing on network-level controls and operational strategies tailored to the unique constraints of this vulnerability.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- cisa-cg
- Date Reserved
- 2025-04-15T20:57:14.282Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68bb230f3933eaf832a4e5f2
Added to database: 9/5/2025, 5:51:11 PM
Last enriched: 9/12/2025, 11:56:37 PM
Last updated: 10/19/2025, 12:32:09 PM
Views: 63
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-11940: Uncontrolled Search Path in LibreWolf
HighCVE-2025-11939: Path Traversal in ChurchCRM
MediumCVE-2025-11938: Deserialization in ChurchCRM
MediumResearchers Uncover WatchGuard VPN Bug That Could Let Attackers Take Over Devices
CriticalCVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.