Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-41016: CWE-862 Missing Authorization in Davantis DFUSION

0
High
VulnerabilityCVE-2025-41016cvecve-2025-41016cwe-862
Published: Mon Nov 24 2025 (11/24/2025, 12:18:45 UTC)
Source: CVE Database V5
Vendor/Project: Davantis
Product: DFUSION

Description

Inadequate access control vulnerability in Davantis DFUSION v6.177.7, which allows unauthorised actors to extract images and videos related to alarm events through access to “/alarms/<ALARM_ID>/<MEDIA>”, where the “MEDIA” parameter can take the value of “snapshot” or “video.mp4”. These media files contain images recorded by security cameras in response to triggered alerts.

AI-Powered Analysis

AILast updated: 11/24/2025, 12:52:39 UTC

Technical Analysis

CVE-2025-41016 is an access control vulnerability classified under CWE-862 affecting Davantis DFUSION, a security monitoring platform widely used for managing alarm events and associated media. The vulnerability exists in versions prior to 6.186.1, where the application fails to enforce proper authorization on the REST endpoint /alarms/<ALARM_ID>/<MEDIA>. Here, the MEDIA parameter accepts values such as 'snapshot' or 'video.mp4', which correspond to images and videos recorded by security cameras triggered by alarms. Due to missing authorization checks, any unauthenticated actor can directly request and retrieve these media files, bypassing intended access restrictions. The vulnerability is remotely exploitable over the network without authentication or user interaction, as indicated by the CVSS 4.0 vector AV:N/AC:L/AT:N/PR:N/UI:N. The impact is primarily on confidentiality, as attackers can obtain sensitive surveillance footage that may contain private or security-sensitive information. Integrity and availability are not affected. Although no exploits have been reported in the wild yet, the ease of exploitation and the sensitivity of the data involved make this a critical issue for organizations relying on Davantis DFUSION for security operations. The vulnerability was publicly disclosed on November 24, 2025, with a CVSS score of 8.7 (high severity). No official patches are linked yet, so mitigation may require compensating controls until updates are available.

Potential Impact

For European organizations, the unauthorized disclosure of security camera footage can have severe consequences. Confidentiality breaches may expose sensitive operational details, employee activities, or private areas within facilities, leading to privacy violations and regulatory non-compliance under GDPR. Attackers could leverage the extracted media for reconnaissance, facilitating further targeted attacks or physical intrusions. Critical infrastructure operators, government facilities, and private enterprises using Davantis DFUSION for alarm monitoring are at heightened risk. The exposure of surveillance data undermines trust in security systems and may result in reputational damage, legal liabilities, and financial losses. Since the vulnerability requires no authentication and is exploitable remotely, attackers can operate stealthily from outside the network perimeter. The lack of known exploits in the wild suggests a window of opportunity for defenders to act proactively before active exploitation occurs.

Mitigation Recommendations

Organizations should immediately verify their Davantis DFUSION version and upgrade to 6.186.1 or later once the patch is released. Until an official patch is available, implement network-level access controls to restrict access to the DFUSION management interface and alarm media endpoints to trusted internal IP addresses only. Employ web application firewalls (WAFs) to detect and block unauthorized requests targeting the /alarms/ endpoint. Conduct thorough audits of access logs to identify any suspicious or unauthorized media retrieval attempts. Segregate the security monitoring network segment from general corporate networks and enforce strict authentication and authorization policies on all interfaces. Additionally, consider encrypting stored media and implementing monitoring alerts for unusual access patterns. Engage with Davantis support for any vendor-specific mitigation guidance and monitor threat intelligence feeds for emerging exploit reports.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
INCIBE
Date Reserved
2025-04-16T09:09:25.290Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6924518b00c839aeb20c718a

Added to database: 11/24/2025, 12:37:31 PM

Last enriched: 11/24/2025, 12:52:39 PM

Last updated: 11/24/2025, 1:46:31 PM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats