Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66049: CWE-306 Missing Authentication for Critical Function in Vivotek IP7137

0
High
VulnerabilityCVE-2025-66049cvecve-2025-66049cwe-306
Published: Fri Jan 09 2026 (01/09/2026, 11:53:41 UTC)
Source: CVE Database V5
Vendor/Project: Vivotek
Product: IP7137

Description

Vivotek IP7137 camera with firmware version 0200a is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security.  The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

AI-Powered Analysis

AILast updated: 01/09/2026, 12:07:28 UTC

Technical Analysis

CVE-2025-66049 identifies a critical security vulnerability in the Vivotek IP7137 IP camera, specifically firmware version 0200a, where the RTSP (Real Time Streaming Protocol) service on port 8554 does not require any authentication to access live video streams. This represents a classic case of CWE-306, Missing Authentication for a Critical Function, allowing any network-connected attacker to view live camera footage without credentials. The vulnerability compromises confidentiality by exposing sensitive surveillance data, potentially enabling espionage, privacy violations, or reconnaissance for further attacks. The vendor has not responded to the CNA and the product is end-of-life, meaning no patches or firmware updates will be issued to remediate this flaw. The CVSS 4.0 base score of 8.7 reflects a network attack vector with low complexity, no privileges or user interaction required, and a high impact on confidentiality. Although no known exploits have been reported in the wild, the simplicity of exploitation and the critical nature of the exposed data make this a significant threat. The vulnerability affects all devices running the specified firmware, and possibly other versions, given the lack of vendor response. Organizations using these cameras must assume exposure and take immediate compensating controls to prevent unauthorized access to video feeds.

Potential Impact

For European organizations, this vulnerability poses a substantial risk to privacy and security, especially for entities relying on Vivotek IP7137 cameras for physical security monitoring. Unauthorized access to live video streams can lead to exposure of sensitive operational environments, employee activities, or confidential information. Critical infrastructure operators, government agencies, and enterprises in sectors such as finance, healthcare, and manufacturing could face espionage, reputational damage, or regulatory penalties under GDPR due to unauthorized data disclosure. The lack of vendor support and patches increases the risk of prolonged exposure. Attackers could leverage the vulnerability for surveillance, planning physical intrusions, or launching further cyberattacks. The ease of exploitation means even low-skilled attackers with network access can compromise these devices, amplifying the threat landscape. Additionally, compromised cameras could be used as entry points into internal networks if not properly segmented.

Mitigation Recommendations

Given the absence of vendor patches, European organizations must implement compensating controls. First, isolate the affected cameras on dedicated VLANs or network segments with strict access controls to limit exposure to trusted personnel only. Disable RTSP streaming if not essential, or restrict access to RTSP port 8554 via firewall rules to authorized IP addresses. Replace end-of-life Vivotek IP7137 cameras with supported models that enforce strong authentication and receive security updates. Employ network monitoring to detect unauthorized access attempts to the cameras. If replacement is not immediately feasible, consider deploying VPNs or encrypted tunnels for remote access to the camera feeds to add an authentication layer. Regularly audit and update network device inventories to identify and remediate vulnerable devices. Finally, raise user awareness about the risks of exposed surveillance devices and enforce strict physical security policies.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-21T10:41:30.019Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960eda77a8fb5c58f471d14

Added to database: 1/9/2026, 11:59:35 AM

Last enriched: 1/9/2026, 12:07:28 PM

Last updated: 2/21/2026, 2:49:15 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats