Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64770: CWE-306 in iCam365 P201

0
High
VulnerabilityCVE-2025-64770cvecve-2025-64770cwe-306
Published: Thu Nov 20 2025 (11/20/2025, 20:25:44 UTC)
Source: CVE Database V5
Vendor/Project: iCam365
Product: P201

Description

The affected products allow unauthenticated access to Open Network Video Interface Forum (ONVIF) services, which may allow an attacker unauthorized access to camera configuration information.

AI-Powered Analysis

AILast updated: 11/27/2025, 21:12:16 UTC

Technical Analysis

CVE-2025-64770 identifies a security vulnerability in the iCam365 P201 network camera product, specifically involving the Open Network Video Interface Forum (ONVIF) services. The vulnerability is classified as CWE-306, which means there is missing authentication for critical functions. In this case, the ONVIF services on the affected device allow unauthenticated access, enabling an attacker to connect to these services without any credentials. This unauthorized access can expose sensitive camera configuration information, which may include network settings, user accounts, and potentially other operational parameters. The vulnerability has been assigned a CVSS 4.0 base score of 7.0, reflecting a high severity level. The vector indicates that the attack requires adjacent network access (AV:A), low attack complexity (AC:L), no attack prerequisites (AT:N), low privileges (PR:L), no user interaction (UI:N), and impacts confidentiality highly (VC:H), integrity low (VI:L), and availability low (VA:L). The vulnerability does not require physical access or user interaction, making it easier to exploit in environments where the attacker can reach the device on the network. Although no public exploits or active exploitation have been reported, the exposure of configuration data can facilitate further attacks such as unauthorized surveillance, device manipulation, or lateral movement within a network. The affected product is the iCam365 P201, with no specific version restrictions noted beyond the affected version '0', implying the issue may be present in all current versions. The lack of available patches at the time of publication increases the urgency for alternative mitigations. This vulnerability is particularly concerning for organizations relying on these cameras for security, surveillance, or operational monitoring, as it undermines the confidentiality and potentially the integrity of the device's configuration.

Potential Impact

For European organizations, the impact of CVE-2025-64770 can be significant, especially in sectors relying heavily on networked video surveillance such as critical infrastructure, transportation, public safety, and private enterprises. Unauthorized access to camera configuration information can lead to privacy violations, exposure of sensitive operational details, and potential manipulation of camera settings. This could enable attackers to disable cameras, alter video feeds, or use the devices as entry points for broader network attacks. The confidentiality breach may also expose network topology or credentials stored in the device, increasing the risk of lateral movement within corporate or governmental networks. Given the high severity and ease of exploitation without authentication or user interaction, organizations face a heightened risk of targeted attacks or opportunistic scanning by threat actors. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as attackers may develop exploits rapidly once the vulnerability is public. European entities with extensive deployment of iCam365 P201 devices or similar ONVIF-enabled cameras are particularly vulnerable. The impact extends beyond individual organizations to national security concerns if critical infrastructure surveillance is compromised.

Mitigation Recommendations

1. Network Segmentation: Isolate iCam365 P201 devices on dedicated VLANs or network segments with strict access controls to limit exposure to trusted systems only. 2. Disable ONVIF Services: If ONVIF functionality is not required, disable these services on the devices to eliminate the attack surface. 3. Access Control Lists (ACLs): Implement ACLs on network devices to restrict access to camera management interfaces to authorized IP addresses or subnets. 4. Monitor Network Traffic: Deploy intrusion detection/prevention systems (IDS/IPS) to detect anomalous access attempts to ONVIF services and alert security teams. 5. Firmware Updates: Regularly check for and apply vendor firmware updates or patches addressing this vulnerability once available. 6. Credential Management: Even though this vulnerability allows unauthenticated access, ensure strong credentials are used elsewhere to prevent further compromise. 7. Incident Response Planning: Prepare response procedures for potential exploitation scenarios involving camera systems. 8. Vendor Engagement: Engage with iCam365 to obtain timelines for patches and request mitigation guidance. 9. Physical Security: Ensure physical security of devices to prevent direct tampering that could exacerbate risks. 10. Network Access Controls: Employ zero-trust principles where possible, requiring authentication and authorization for device management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2025-11-11T20:50:34.868Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 691f7c954f1c50aa2eb03748

Added to database: 11/20/2025, 8:39:49 PM

Last enriched: 11/27/2025, 9:12:16 PM

Last updated: 1/7/2026, 3:41:30 AM

Views: 107

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats