Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66050: CWE-1393 Use of Default Password in Vivotek IP7137

0
Critical
VulnerabilityCVE-2025-66050cvecve-2025-66050cwe-1393
Published: Fri Jan 09 2026 (01/09/2026, 11:53:45 UTC)
Source: CVE Database V5
Vendor/Project: Vivotek
Product: IP7137

Description

Vivotek IP7137 camera with firmware version 0200a by default dos not require to provide any password when logging in as an administrator. While it is possible to set up such a password, a user is not informed about such a need. The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

AI-Powered Analysis

AILast updated: 01/09/2026, 12:07:49 UTC

Technical Analysis

The vulnerability identified as CVE-2025-66050 affects the Vivotek IP7137 IP camera running firmware version 0200a. The core issue is the use of a default configuration that does not require any password for administrator login, effectively allowing unauthenticated remote access with full administrative privileges. This is classified under CWE-1393, which pertains to the use of default passwords. The vendor has not responded to the CNA and has not released any patches, likely due to the product reaching its end-of-life status. The lack of authentication means an attacker can remotely access the camera’s administrative interface without any credentials or user interaction, enabling them to manipulate camera settings, view live feeds, or pivot into the internal network. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N) highlights that the attack is network-based, requires no privileges or user interaction, and results in high confidentiality, integrity, and availability impacts. No known exploits are reported in the wild yet, but the critical nature and ease of exploitation make this a significant threat. Since the product is end-of-life, no official patch is expected, leaving users reliant on compensating controls or device replacement.

Potential Impact

For European organizations, this vulnerability poses a severe risk to security and privacy. Unauthorized access to IP cameras can lead to espionage, unauthorized surveillance, and exposure of sensitive environments. Compromise of these devices can also serve as a foothold for lateral movement within corporate or critical infrastructure networks, potentially leading to broader network compromise. The high CVSS score reflects the potential for complete takeover of the device without any barriers. Sectors such as government facilities, transportation hubs, healthcare, and manufacturing that rely on Vivotek IP7137 cameras for security monitoring are particularly vulnerable. Additionally, the inability to patch the device increases the risk of long-term exposure. Data protection regulations like GDPR may also be implicated if personal data captured by these cameras is accessed or leaked due to this vulnerability.

Mitigation Recommendations

Given the lack of vendor patches, European organizations should immediately implement network-level mitigations. These include isolating affected cameras on separate VLANs or network segments with strict access controls, disabling remote access to the camera’s administrative interface, and employing firewall rules to restrict inbound traffic. Organizations should audit their inventory to identify all Vivotek IP7137 devices and assess exposure. Where possible, replace affected devices with supported models that enforce strong authentication by default. Monitoring network traffic for unusual access patterns to these cameras can help detect exploitation attempts. Additionally, educating users and administrators about the risks of default credentials and enforcing strong password policies on all networked devices is critical. Finally, organizations should review and update their incident response plans to address potential compromises involving IP cameras.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERT-PL
Date Reserved
2025-11-21T10:41:30.020Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6960eda77a8fb5c58f471d17

Added to database: 1/9/2026, 11:59:35 AM

Last enriched: 1/9/2026, 12:07:49 PM

Last updated: 2/22/2026, 3:22:46 AM

Views: 83

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats