Skip to main content

CVE-2025-57437: n/a

Critical
VulnerabilityCVE-2025-57437cvecve-2025-57437
Published: Mon Sep 22 2025 (09/22/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

The Blackmagic Web Presenter HD firmware version 3.3 exposes sensitive information via an unauthenticated Telnet service on port 9977. When connected, the service reveals extensive device configuration data including: - Model, version, and unique identifiers - Network settings including IP, MAC, DNS - Current stream platform, stream key, and streaming URL - Audio/video configuration This data can be used to hijack live streams or perform network reconnaissance.

AI-Powered Analysis

AILast updated: 09/22/2025, 17:25:14 UTC

Technical Analysis

CVE-2025-57437 is a firmware vulnerability affecting the Blackmagic Web Presenter HD device, specifically firmware version 3.3. The vulnerability arises from an unauthenticated Telnet service listening on port 9977, which exposes sensitive device configuration information to any unauthenticated remote user who can connect to this port. The exposed data includes critical details such as the device model, firmware version, unique device identifiers, network configuration parameters (IP address, MAC address, DNS settings), and streaming-related credentials including the current streaming platform, stream key, and streaming URL. Additionally, audio and video configuration settings are disclosed. This information leakage can facilitate malicious actors in hijacking live streams by using the exposed stream keys and URLs, or performing network reconnaissance to map the internal network environment and identify further attack vectors. The vulnerability does not require authentication or user interaction, making it trivially exploitable by anyone with network access to the device's Telnet port. No CVSS score has been assigned yet, and no patches or mitigations have been officially published as of the vulnerability disclosure date (September 22, 2025).

Potential Impact

For European organizations using Blackmagic Web Presenter HD devices, particularly in media production, broadcasting, or live event streaming, this vulnerability poses a significant risk. Unauthorized disclosure of stream keys and URLs can lead to live stream hijacking, resulting in content disruption, unauthorized content injection, or broadcasting of malicious or misleading information. This can damage organizational reputation, violate content licensing agreements, and potentially cause financial losses. Furthermore, exposure of network configuration details can aid attackers in lateral movement within corporate networks, increasing the risk of broader compromise. Given the critical role of live streaming in media and corporate communications, exploitation could disrupt business continuity and erode trust with customers and partners. The lack of authentication and ease of exploitation heightens the threat level, especially in environments where these devices are accessible from less secure network segments or exposed to the internet.

Mitigation Recommendations

Immediate mitigation steps include restricting network access to the Telnet port 9977 by implementing firewall rules or network segmentation to limit connectivity only to trusted management hosts. Organizations should disable the Telnet service if possible or replace it with a secure management interface such as SSH with strong authentication. Monitoring network traffic for unusual connections to port 9977 can help detect exploitation attempts. Since no official patches are available, organizations should engage with Blackmagic Design support to inquire about firmware updates addressing this issue and apply them promptly once released. Additionally, rotating streaming keys and URLs after mitigating the vulnerability can prevent unauthorized stream hijacking. Implementing network intrusion detection systems (NIDS) to alert on suspicious Telnet activity and conducting regular security audits of streaming infrastructure are recommended. Finally, educating operational staff about this vulnerability and enforcing strict access controls around streaming devices will reduce exposure.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68d18657c1d31cc80230d16f

Added to database: 9/22/2025, 5:24:39 PM

Last enriched: 9/22/2025, 5:25:14 PM

Last updated: 9/24/2025, 4:56:02 PM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats