Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64730: Cross-site scripting (XSS) in Sony Corporation SNC-CX600W

0
Medium
VulnerabilityCVE-2025-64730cvecve-2025-64730
Published: Tue Nov 25 2025 (11/25/2025, 04:37:26 UTC)
Source: CVE Database V5
Vendor/Project: Sony Corporation
Product: SNC-CX600W

Description

Cross-site scripting vulnerability exists in SNC-CX600W all versions. If this vulnerability is exploited, an arbitrary script may be executed on the web browser of the user who accessed the product.

AI-Powered Analysis

AILast updated: 12/02/2025, 05:12:16 UTC

Technical Analysis

CVE-2025-64730 is a cross-site scripting (XSS) vulnerability identified in all versions of the Sony Corporation SNC-CX600W IP camera. This vulnerability arises from insufficient input sanitization in the device's web interface, allowing attackers to inject arbitrary scripts that execute in the context of a user's browser when they access the compromised interface. The attack vector is remote and requires the victim to interact with a maliciously crafted URL or web page that triggers the XSS payload. No authentication is required to exploit this vulnerability, but user interaction is necessary, such as clicking a link or visiting a malicious page. The vulnerability impacts the confidentiality and integrity of the user session by potentially enabling theft of cookies, session tokens, or other sensitive information, as well as enabling actions on behalf of the user. However, it does not affect the availability of the device. The CVSS v3.0 base score is 5.2, indicating medium severity, with attack vector being adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), user interaction required (UI:R), scope changed (S:C), and low impact on confidentiality and integrity (C:L, I:L), and no impact on availability (A:N). There are no known exploits in the wild at the time of publication, and no patches have been linked yet. The vulnerability was published on November 25, 2025, by JPCERT. The SNC-CX600W is commonly used in surveillance and security monitoring, which makes this vulnerability relevant for organizations relying on these devices for physical security.

Potential Impact

For European organizations, exploitation of this XSS vulnerability could lead to unauthorized access to user sessions, theft of credentials, or execution of malicious scripts within the context of the device's web interface. This could facilitate further attacks such as lateral movement within networks, data exfiltration, or manipulation of camera feeds. Organizations using these cameras in sensitive environments—such as government facilities, critical infrastructure, or corporate offices—may face increased risk of espionage or sabotage. The impact is primarily on confidentiality and integrity of user interactions with the device. Since the vulnerability requires user interaction and is limited to adjacent network access, the risk is somewhat contained but still significant in environments where users frequently access these devices' web interfaces. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits over time. The medium severity rating suggests that while not critical, the vulnerability should be addressed promptly to avoid potential compromise.

Mitigation Recommendations

1. Monitor Sony’s official channels for patches or firmware updates addressing CVE-2025-64730 and apply them immediately upon release. 2. Restrict access to the SNC-CX600W web interface to trusted networks only, using network segmentation and firewall rules to limit exposure. 3. Implement strong authentication and access controls on the device to reduce the likelihood of unauthorized access. 4. Employ web application firewalls (WAFs) or reverse proxies with input validation capabilities to detect and block malicious script injections targeting the camera’s interface. 5. Educate users about the risks of clicking on unknown or suspicious links related to device management interfaces. 6. Regularly audit and monitor network traffic and device logs for unusual activity that could indicate exploitation attempts. 7. Consider disabling web interface access if not required or replacing vulnerable devices with models that have secure coding practices and active vendor support.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
jpcert
Date Reserved
2025-11-19T08:47:53.543Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6925392a441560fe7ee067f0

Added to database: 11/25/2025, 5:05:46 AM

Last enriched: 12/2/2025, 5:12:16 AM

Last updated: 1/10/2026, 10:13:49 PM

Views: 108

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats