CVE-2025-12351

6.8 MEDIUM

📋 TL;DR

Honeywell S35 Series Cameras have an authorization bypass vulnerability in the user controller key that allows attackers to escalate privileges to admin functionality. This affects all Honeywell S35 camera models running vulnerable firmware versions. Attackers could gain administrative control over affected cameras.

💻 Affected Systems

Products:
  • Honeywell S35 Pinhole/Kit Camera
  • Honeywell S35 AI Fisheye & Dual Sensor Camera
  • Honeywell S35 Micro Dome Camera
  • Honeywell S35 Full Color Eyeball & Bullet Camera
  • Honeywell S35 Thermal Camera
Versions: All versions prior to patched versions
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All default configurations of affected camera models are vulnerable until patched.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of camera system with admin access, allowing video stream manipulation, configuration changes, and potential lateral movement to connected systems.

🟠

Likely Case

Unauthorized access to camera feeds, configuration tampering, and potential denial of service through camera settings manipulation.

🟢

If Mitigated

Limited impact with proper network segmentation and access controls, though camera functionality could still be compromised.

🌐 Internet-Facing: HIGH - Cameras exposed to internet are directly vulnerable to remote exploitation without authentication.
🏢 Internal Only: MEDIUM - Requires internal network access but can be exploited by malicious insiders or compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires understanding of the user controller key mechanism but no authentication is needed once the vulnerability is understood.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: S35 Pinhole/Kit Camera: 2025.08.28, S35 AI Fisheye & Dual Sensor/Micro Dome/Full Color Eyeball & Bullet Camera: 2025.08.22, S35 Thermal Camera: 2025.08.26

Vendor Advisory: https://www.honeywell.com/us/en/product-security

Restart Required: No

Instructions:

1. Identify camera model and current firmware version. 2. Download appropriate firmware update from Honeywell support portal. 3. Upload firmware to camera via web interface. 4. Apply update and verify successful installation.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN with strict firewall rules limiting access to management interfaces.

Access Control Lists

all

Implement IP-based restrictions to camera management interfaces allowing only authorized administrative systems.

🧯 If You Can't Patch

  • Remove cameras from internet-facing networks immediately
  • Implement strict network segmentation and monitor for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check firmware version in camera web interface under System > Information or similar menu.

Check Version:

No CLI command - check via web interface or camera management software

Verify Fix Applied:

Confirm firmware version matches patched versions: 2025.08.28, 2025.08.22, or 2025.08.26 depending on model.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed login attempts followed by successful admin access
  • Configuration changes from unexpected IP addresses
  • Unusual user privilege escalation events

Network Indicators:

  • Unauthorized access to camera management ports (typically 80/443)
  • Traffic patterns indicating privilege escalation attempts

SIEM Query:

source="camera_logs" AND (event="admin_login" OR event="config_change") AND user!="authorized_admin"

🔗 References

📤 Share & Export