Skip to main content

CVE-2025-6951: Use of Default Credentials in SAFECAM X300

Medium
VulnerabilityCVE-2025-6951cvecve-2025-6951
Published: Tue Jul 01 2025 (07/01/2025, 11:32:05 UTC)
Source: CVE Database V5
Vendor/Project: SAFECAM
Product: X300

Description

A vulnerability classified as problematic was found in SAFECAM X300 up to 20250611. This vulnerability affects unknown code of the component FTP Service. The manipulation leads to use of default credentials. Access to the local network is required for this attack to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 07/01/2025, 11:55:41 UTC

Technical Analysis

CVE-2025-6951 is a vulnerability identified in the SAFECAM X300 device, specifically affecting the FTP Service component. The core issue is the use of default credentials that remain unchanged or hardcoded, allowing unauthorized access if an attacker can connect to the local network. This vulnerability does not require any authentication, user interaction, or elevated privileges to exploit, but it does require network access within the local environment. The vulnerability is classified as 'problematic' with a CVSS 4.0 base score of 5.3 (medium severity), reflecting moderate impact and ease of exploitation. The vulnerability allows an attacker to gain unauthorized access to the device via FTP, potentially exposing sensitive data or enabling further network reconnaissance or lateral movement. The vendor has not responded to early notifications, and no patches or mitigations have been published at the time of disclosure. Although no known exploits are currently observed in the wild, the public disclosure increases the risk of exploitation by malicious actors. The vulnerability impacts SAFECAM X300 devices up to version 20250611, which are likely deployed in security and surveillance contexts where FTP services are enabled for device management or data transfer. The lack of vendor response and absence of patches necessitate immediate attention from users and administrators to mitigate risk.

Potential Impact

For European organizations, the exploitation of CVE-2025-6951 could lead to unauthorized access to SAFECAM X300 devices on their local networks. This could compromise the confidentiality and integrity of surveillance data, potentially exposing sensitive video feeds or configuration files. Attackers gaining access via FTP could pivot within the network, increasing the risk of broader network compromise. The impact is particularly significant for organizations relying on SAFECAM devices for critical security infrastructure, such as government facilities, transportation hubs, and critical infrastructure operators. The medium severity rating indicates that while the vulnerability does not directly cause denial of service or remote code execution, it still poses a meaningful risk of unauthorized access and data exposure. Given the vendor's lack of response and absence of patches, European organizations must assume the vulnerability remains unmitigated, increasing the urgency for internal controls. The requirement for local network access limits remote exploitation but does not eliminate risk, especially in environments with weak network segmentation or where attackers have already gained some network foothold.

Mitigation Recommendations

To mitigate CVE-2025-6951, European organizations should immediately audit all SAFECAM X300 devices to identify those running affected firmware versions (up to 20250611). Since no official patches are available, organizations must implement compensating controls: 1) Change default FTP credentials on all devices to strong, unique passwords to prevent unauthorized access. 2) Disable FTP services if not strictly necessary, or restrict FTP access via network segmentation and firewall rules to trusted management hosts only. 3) Monitor network traffic for unusual FTP activity, including unexpected connections or data transfers involving SAFECAM devices. 4) Implement network access controls such as VLANs or NAC (Network Access Control) to limit local network exposure of these devices. 5) Regularly review device configurations and logs for signs of compromise. 6) Engage with SAFECAM or authorized vendors for updates or guidance and consider alternative devices if no remediation is forthcoming. 7) Educate IT and security teams about the vulnerability and ensure incident response plans include steps for potential exploitation scenarios involving these devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-07-01T05:46:34.521Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6863c9006f40f0eb728f0ed0

Added to database: 7/1/2025, 11:39:44 AM

Last enriched: 7/1/2025, 11:55:41 AM

Last updated: 7/4/2025, 2:16:51 PM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats