CVE-2025-24517

7.5 HIGH

📋 TL;DR

A client-side authentication vulnerability in CHOCO TEI WATCHER mini (IB-MCT001) allows remote attackers to obtain the product's login password without authentication. This affects all versions of the device, potentially compromising camera security and surveillance systems.

💻 Affected Systems

Products:
  • CHOCO TEI WATCHER mini (IB-MCT001)
Versions: All versions
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices running this firmware are vulnerable by default configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain administrative access to cameras, enabling remote surveillance, disabling recording, or using devices as network footholds for lateral movement.

🟠

Likely Case

Unauthorized access to camera feeds and settings, potentially disrupting production line monitoring and security operations.

🟢

If Mitigated

Limited impact if devices are isolated in segmented networks with strict access controls and monitoring.

🌐 Internet-Facing: HIGH - Direct internet exposure allows remote attackers to exploit without network access.
🏢 Internal Only: MEDIUM - Requires internal network access but exploitation is still possible from compromised internal systems.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows password extraction without authentication, making exploitation straightforward once identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: None available

Vendor Advisory: https://www.inaba.co.jp/files/chocomini_vulnerability.pdf

Restart Required: No

Instructions:

No official patch exists. Follow workarounds and mitigation steps below.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras in dedicated VLANs with strict firewall rules preventing external access.

Access Control Lists

all

Implement IP-based restrictions allowing only authorized management systems to communicate with cameras.

🧯 If You Can't Patch

  • Deploy network monitoring to detect unusual authentication attempts or password extraction patterns.
  • Consider replacing vulnerable devices with patched alternatives if available from vendor.

🔍 How to Verify

Check if Vulnerable:

Check device model and firmware version via web interface or documentation. All IB-MCT001 devices are vulnerable.

Check Version:

Access device web interface and check system information page.

Verify Fix Applied:

No fix available to verify. Verify workarounds by testing network isolation and access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unusual authentication attempts from unexpected IPs
  • Multiple failed login attempts followed by successful access

Network Indicators:

  • HTTP requests to authentication endpoints from unauthorized sources
  • Unusual outbound traffic from cameras

SIEM Query:

source_ip IN (camera_ips) AND (http_uri CONTAINS 'login' OR http_uri CONTAINS 'auth') AND NOT dest_ip IN (authorized_management_ips)

🔗 References

📤 Share & Export