Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64770: CWE-306 in iCam365 P201

0
High
VulnerabilityCVE-2025-64770cvecve-2025-64770cwe-306
Published: Thu Nov 20 2025 (11/20/2025, 20:25:44 UTC)
Source: CVE Database V5
Vendor/Project: iCam365
Product: P201

Description

The affected products allow unauthenticated access to Open Network Video Interface Forum (ONVIF) services, which may allow an attacker unauthorized access to camera configuration information.

AI-Powered Analysis

AILast updated: 11/20/2025, 20:40:01 UTC

Technical Analysis

CVE-2025-64770 identifies a vulnerability in the iCam365 P201 network camera product that allows unauthorized access to Open Network Video Interface Forum (ONVIF) services. The root cause is an access control weakness classified as CWE-306 (Missing Authentication for Critical Function). This flaw permits attackers to bypass authentication mechanisms and remotely access sensitive camera configuration data without requiring user interaction. The vulnerability is exploitable over the network (Attack Vector: Adjacent), with low attack complexity and no need for user interaction or elevated privileges beyond low-level access. The CVSS v4.0 score of 7 reflects a high severity, primarily due to the high impact on confidentiality, with limited but present impacts on integrity and availability. The affected versions are indicated as '0', which likely means initial or all versions prior to patching. The vulnerability could allow attackers to gather configuration details that might facilitate further attacks or privacy violations. No patches or known exploits are currently documented, but the risk remains significant given the nature of ONVIF services in managing camera operations. The vulnerability's presence in surveillance equipment raises concerns about unauthorized surveillance, data leakage, and potential disruption of security monitoring systems.

Potential Impact

For European organizations, especially those relying on iCam365 P201 cameras for security, surveillance, or operational monitoring, this vulnerability poses a substantial risk. Unauthorized access to camera configuration can lead to exposure of sensitive information, including network settings, user credentials, or camera positioning. This could enable attackers to manipulate camera functions, disable monitoring, or pivot to other network assets, undermining physical and cyber security. Critical infrastructure sectors such as transportation, energy, and government facilities that deploy these cameras could face increased risks of espionage, sabotage, or privacy violations. The impact on confidentiality is high, with moderate risks to integrity and availability. The vulnerability's exploitation could also erode trust in security systems and lead to regulatory compliance issues under GDPR if personal data is exposed. Given the ease of exploitation and lack of required user interaction, the threat is particularly relevant for organizations with exposed or poorly segmented network environments.

Mitigation Recommendations

To mitigate CVE-2025-64770, organizations should immediately restrict network access to ONVIF services on iCam365 P201 devices by implementing firewall rules or network segmentation to limit exposure to trusted management networks only. Disable ONVIF services if not required or configure them to require strong authentication mechanisms. Monitor network traffic for unusual access patterns to ONVIF ports and deploy intrusion detection systems capable of recognizing exploitation attempts. Since no official patches are currently available, maintain close communication with the vendor for updates and apply patches promptly once released. Conduct regular security audits of camera configurations and credentials to detect unauthorized changes. Employ network access control (NAC) solutions to enforce device authentication and isolate vulnerable devices. Additionally, consider replacing or upgrading devices that cannot be adequately secured. Document and enforce strict policies for physical and network access to surveillance equipment to reduce attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-11T20:50:34.868Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691f7c954f1c50aa2eb03748

Added to database: 11/20/2025, 8:39:49 PM

Last enriched: 11/20/2025, 8:40:01 PM

Last updated: 11/21/2025, 12:53:36 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats