Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63667: n/a

0
High
VulnerabilityCVE-2025-63667cvecve-2025-63667
Published: Wed Nov 12 2025 (11/12/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Incorrect access control in SIMICAM v1.16.41-20250725, KEVIEW v1.14.92-20241120, ASECAM v1.14.10-20240725 allows attackers to access sensitive API endpoints without authentication.

AI-Powered Analysis

AILast updated: 01/06/2026, 13:59:31 UTC

Technical Analysis

CVE-2025-63667 is a vulnerability categorized under CWE-284 (Improper Access Control) found in specific versions of SIMICAM, KEVIEW, and ASECAM software products. These products appear to be related to camera or monitoring systems, given their naming conventions. The flaw allows attackers to bypass authentication mechanisms and directly access sensitive API endpoints remotely over the network without any user interaction or privileges. The CVSS v3.1 score of 7.5 (High) reflects the ease of exploitation (network attack vector, no privileges required, no user interaction) and the high impact on confidentiality, as attackers can retrieve sensitive information from the affected systems. However, the vulnerability does not impact integrity or availability, limiting the scope of damage to data exposure. No patches or exploit code are currently publicly available, but the vulnerability is publicly disclosed and should be considered a significant risk. The lack of authentication on sensitive API endpoints suggests a fundamental design or implementation flaw in the access control mechanisms of these products. Organizations using these versions should assume their sensitive data could be exposed if the systems are accessible from untrusted networks.

Potential Impact

For European organizations, the primary impact is the unauthorized disclosure of sensitive information managed or transmitted by the affected camera or monitoring systems. This could include video feeds, configuration data, user credentials, or other sensitive operational data. Exposure of such data could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and potential espionage or competitive intelligence gathering. Critical infrastructure sectors such as transportation, energy, public safety, and manufacturing that rely on these monitoring systems may face increased risk of targeted attacks or surveillance. The vulnerability does not directly allow system takeover or denial of service but could be leveraged as a foothold for further attacks if combined with other vulnerabilities. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits following public disclosure.

Mitigation Recommendations

1. Immediately restrict network access to affected devices and their API endpoints, ideally isolating them within secure network segments inaccessible from untrusted networks. 2. Implement strict firewall rules and access control lists (ACLs) to limit API endpoint exposure only to trusted management systems and personnel. 3. Conduct thorough audits of all API endpoints to verify proper authentication and authorization controls are in place. 4. Monitor network traffic and logs for unusual or unauthorized access attempts to these devices. 5. Engage with vendors for official patches or updates addressing this vulnerability; if unavailable, consider temporary compensating controls such as VPN access or additional authentication proxies. 6. Review and enhance overall device security posture, including changing default credentials, disabling unused services, and applying principle of least privilege. 7. Educate relevant staff about the risks and signs of exploitation attempts related to these systems. 8. Prepare incident response plans specifically addressing potential data exposure from these devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69149adfe0dfecc86585ba9f

Added to database: 11/12/2025, 2:34:07 PM

Last enriched: 1/6/2026, 1:59:31 PM

Last updated: 2/7/2026, 10:44:44 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats