Skip to main content
DashboardThreatsMapFeedsAPI
reconnecting
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-9383: Use of Weak Hash in FNKvision Y215 CCTV Camera

0
Low
VulnerabilityCVE-2025-9383cvecve-2025-9383
Published: Sun Aug 24 2025 (08/24/2025, 09:32:07 UTC)
Source: CVE Database V5
Vendor/Project: FNKvision
Product: Y215 CCTV Camera

Description

A security vulnerability has been detected in FNKvision Y215 CCTV Camera 10.194.120.40. This issue affects the function crypt of the file /etc/passwd. The manipulation leads to use of weak hash. The attack can only be performed from a local environment. The complexity of an attack is rather high. The exploitability is assessed as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

AILast updated: 09/01/2025, 01:02:28 UTC

Technical Analysis

CVE-2025-9383 is a security vulnerability identified in the FNKvision Y215 CCTV Camera, specifically version 10.194.120.40. The vulnerability arises from the use of a weak cryptographic hash function in the handling of the /etc/passwd file, which is critical for storing user account information on Unix-like systems. The weakness is located in the 'crypt' function, which is responsible for hashing passwords. The use of a weak hash algorithm can potentially allow an attacker with local access to the device to perform offline password cracking or other cryptographic attacks to recover user credentials. However, exploitation requires local access to the device, and the attack complexity is high, meaning it is difficult to execute. No user interaction or authentication is required beyond local access, but the attack vector is limited to local environment access only. The vendor, FNKvision, was notified but did not respond or provide a patch, and no official remediation is currently available. The vulnerability has a low CVSS v4.0 score of 2.0, reflecting limited impact and exploitability. There are no known exploits in the wild at this time. This vulnerability primarily threatens the confidentiality of user credentials stored on the device, with no direct impact on integrity or availability. Given the nature of the device (CCTV camera), compromised credentials could potentially allow unauthorized local access to the device, leading to privacy breaches or further lateral movement within a network if the device is connected to a larger surveillance or enterprise system.

Potential Impact

For European organizations deploying FNKvision Y215 CCTV cameras, this vulnerability poses a limited but non-negligible risk. The primary impact is the potential compromise of local user credentials, which could lead to unauthorized access to the camera's management interface or stored data. In environments where these cameras are integrated into broader security or surveillance networks, an attacker gaining local access could pivot to other systems, potentially undermining physical security monitoring. However, since exploitation requires local access and is difficult, remote attackers are unlikely to exploit this vulnerability directly. The lack of vendor response and patch availability increases the risk for organizations relying on these devices, as they cannot remediate the weakness through official updates. European organizations with sensitive surveillance deployments, especially in critical infrastructure, government, or corporate environments, should be aware of this risk. The confidentiality of surveillance data and device control could be compromised if an attacker gains physical or local network access to the device.

Mitigation Recommendations

1. Restrict physical and local network access to FNKvision Y215 CCTV cameras to trusted personnel only, minimizing the risk of local exploitation. 2. Implement network segmentation and access controls to isolate CCTV cameras from general user networks, reducing the likelihood of an attacker gaining local access. 3. Monitor and audit local access logs on the devices, if available, to detect any unauthorized attempts to access or manipulate the system. 4. Where possible, replace or upgrade affected devices with models from vendors that provide timely security updates and use strong cryptographic practices. 5. Employ additional layers of security such as VPNs or secure tunnels for management access to the cameras, ensuring that even local access requires strong authentication. 6. Consider deploying host-based intrusion detection systems (HIDS) or network intrusion detection systems (NIDS) to detect anomalous activities around these devices. 7. Maintain an inventory of all deployed FNKvision Y215 devices and track their firmware versions to identify and isolate vulnerable units. 8. Engage with FNKvision or authorized resellers to request security patches or guidance, and monitor security advisories for any updates.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
VulDB
Date Reserved
2025-08-23T15:00:13.624Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68aadfbead5a09ad002f0251

Added to database: 8/24/2025, 9:47:42 AM

Last enriched: 9/1/2025, 1:02:28 AM

Last updated: 10/6/2025, 9:49:46 AM

Views: 42

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats