Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-53947: CWE-276 in Cognex In-Sight 2000 series

0
High
VulnerabilityCVE-2025-53947cvecve-2025-53947cwe-276
Published: Thu Sep 18 2025 (09/18/2025, 21:10:03 UTC)
Source: CVE Database V5
Vendor/Project: Cognex
Product: In-Sight 2000 series

Description

A local attacker with low privileges on the Windows system where the software is installed can exploit this vulnerability to corrupt sensitive data. A data folder is created with very weak privileges, allowing any user logged into the Windows system to modify its content.

AI-Powered Analysis

AILast updated: 09/26/2025, 01:07:28 UTC

Technical Analysis

CVE-2025-53947 is a security vulnerability classified under CWE-276 (Incorrect Default Permissions) affecting the Cognex In-Sight 2000 series software, specifically version 5.x. This vulnerability arises because the software creates a data folder on the Windows system with overly permissive access rights. As a result, any user logged into the Windows system, regardless of privilege level, can modify the contents of this folder. The vulnerability requires local access to the Windows system but does not require any user interaction or elevated privileges to exploit. Exploitation can lead to corruption of sensitive data stored within this folder, impacting the integrity and availability of the data. The CVSS v3.1 base score is 7.7, indicating a high severity level. The vector string (AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H) highlights that the attack vector is local, with low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, confidentiality is not impacted, but integrity and availability are highly impacted. No known exploits have been reported in the wild yet, and no patches have been published at the time of this analysis. This vulnerability is significant in environments where multiple users have access to the same Windows system running the vulnerable Cognex software, as it allows unauthorized modification of critical data files, potentially disrupting industrial or manufacturing processes that rely on this vision system.

Potential Impact

For European organizations using Cognex In-Sight 2000 series devices, particularly in manufacturing, industrial automation, and quality control sectors, this vulnerability poses a substantial risk. The ability for any local user to corrupt sensitive data could lead to production downtime, compromised product quality, and loss of operational integrity. In critical infrastructure or safety-sensitive environments, such data corruption could have cascading effects, including safety hazards or regulatory non-compliance. Since the vulnerability does not require elevated privileges, insider threats or unauthorized personnel with physical or remote access to the Windows host could exploit this flaw. This risk is amplified in shared workstation environments or where endpoint security controls are insufficient. The lack of confidentiality impact reduces the risk of data leakage but does not mitigate the operational risks from data integrity and availability loss. European organizations with stringent regulatory requirements around operational continuity and data integrity (e.g., automotive, aerospace, pharmaceuticals) may face compliance challenges if this vulnerability is exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should first restrict local access to Windows systems running the Cognex In-Sight 2000 series software to trusted personnel only. Implement strict user account controls and limit the number of users with local login capabilities. Until a vendor patch is available, administrators should manually audit and adjust the permissions of the data folder created by the software to restrict write access only to authorized service accounts or administrators. Employ Windows file system ACLs to enforce least privilege principles. Additionally, monitor the integrity of the data folder using file integrity monitoring tools to detect unauthorized changes promptly. Network segmentation and endpoint protection solutions should be used to prevent lateral movement and unauthorized access to affected systems. Organizations should also engage with Cognex support to obtain updates on patch availability and apply them promptly once released. Regular backups of critical data should be maintained to enable recovery in case of data corruption.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
icscert
Date Reserved
2025-08-06T16:32:41.276Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68cc762b04807de649625fbc

Added to database: 9/18/2025, 9:14:19 PM

Last enriched: 9/26/2025, 1:07:28 AM

Last updated: 10/31/2025, 8:23:44 PM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats