Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1241: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Pelco, Inc. Sarix Professional IMP 3 Series

0
High
VulnerabilityCVE-2026-1241cvecve-2026-1241cwe-288
Published: Thu Feb 26 2026 (02/26/2026, 19:21:26 UTC)
Source: CVE Database V5
Vendor/Project: Pelco, Inc.
Product: Sarix Professional IMP 3 Series

Description

The Pelco, Inc. Sarix Professional 3 Series Cameras are vulnerable to an authentication bypass issue in their web management interface. The flaw stems from inadequate enforcement of access controls, allowing certain functionality to be accessed without proper authentication. This weakness can lead to unauthorized viewing of live video streams, creating privacy concerns and operational risks for organizations relying on these cameras. Additionally, it may expose operators to regulatory and compliance challenges.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 21:22:03 UTC

Technical Analysis

CVE-2026-1241 identifies a critical authentication bypass vulnerability in the Pelco Sarix Professional IMP 3 Series cameras' web management interface. The root cause is inadequate enforcement of access controls, allowing attackers to bypass authentication mechanisms and access certain camera functions directly. This vulnerability is categorized under CWE-288, which involves authentication bypass using alternate paths or channels. Exploitation requires no privileges, no user interaction, and can be performed remotely over the network, making it highly accessible to attackers. The primary risk is unauthorized access to live video streams, which compromises confidentiality and privacy. This can lead to exposure of sensitive surveillance footage, undermining operational security and potentially violating privacy regulations. The vulnerability does not affect system integrity or availability directly but poses significant risks due to unauthorized data disclosure. No patches or fixes are currently available, and no known exploits have been reported in the wild. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no authentication required (AT:N), no user interaction (UI:N), and high impact on confidentiality (VC:H) with no impact on integrity or availability. The vulnerability affects all versions of the Sarix Professional IMP 3 Series cameras as indicated. Given the nature of the product—used widely in security and surveillance—the vulnerability presents a substantial threat to organizations relying on these devices for monitoring and security enforcement.

Potential Impact

The primary impact of CVE-2026-1241 is unauthorized access to live video streams from affected Pelco cameras, leading to significant confidentiality breaches. Organizations using these cameras for security monitoring may have sensitive areas exposed to unauthorized viewers, increasing risks of espionage, privacy violations, and operational disruption. This can also lead to regulatory non-compliance, especially in sectors with strict data protection laws such as healthcare, finance, and government. The exposure of surveillance footage can undermine trust in security infrastructure and potentially facilitate further attacks by revealing operational details. Although the vulnerability does not directly affect system integrity or availability, the loss of confidentiality alone can have severe consequences. The ease of exploitation and remote accessibility increase the likelihood of attacks, especially in environments where camera management interfaces are exposed or poorly segmented. The absence of known exploits in the wild currently limits immediate widespread impact, but the vulnerability remains a critical risk until mitigated or patched.

Mitigation Recommendations

1. Immediately restrict network access to the web management interface of Sarix Professional IMP 3 Series cameras by placing them behind firewalls and limiting access to trusted IP addresses only. 2. Implement strict network segmentation to isolate camera management networks from general corporate or public networks. 3. Use VPNs or secure tunnels for remote access to camera interfaces to ensure authentication and encryption. 4. Monitor network traffic and access logs for unusual or unauthorized access attempts to the cameras. 5. Disable any unnecessary services or features on the cameras that could be exploited as alternate access paths. 6. Engage with Pelco, Inc. for official patches or firmware updates addressing this vulnerability and apply them promptly once available. 7. Conduct regular security assessments and penetration testing on surveillance infrastructure to detect similar weaknesses. 8. Educate security and IT staff about the risks of exposing camera management interfaces and enforce strict access control policies. 9. Consider deploying additional security controls such as multi-factor authentication if supported by the camera system. 10. Maintain an incident response plan specific to surveillance system breaches to quickly address potential exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
icscert
Date Reserved
2026-01-20T18:26:34.854Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0a61285912abc71d87500

Added to database: 2/26/2026, 7:59:14 PM

Last enriched: 3/5/2026, 9:22:03 PM

Last updated: 4/13/2026, 7:13:02 AM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses