CVE-2025-35452

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to access PTZOptics and other ValueHD-based pan-tilt-zoom cameras using default, shared administrative credentials. Attackers can gain full control of affected cameras, potentially compromising video feeds and device functionality. Organizations using these cameras with default configurations are at risk.

💻 Affected Systems

Products:
  • PTZOptics cameras
  • Other ValueHD-based pan-tilt-zoom cameras
Versions: All versions with default configuration
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specifically affects cameras using shared default administrative credentials that cannot be changed by users.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control of cameras, enabling them to view/manipulate video feeds, disable cameras, pivot to internal networks, or install persistent malware.

🟠

Likely Case

Unauthorized access to camera administrative interfaces leading to surveillance compromise, configuration changes, or denial of service.

🟢

If Mitigated

Limited impact if cameras are isolated, credentials changed, and access restricted.

🌐 Internet-Facing: HIGH - Internet-exposed cameras with default credentials are trivially exploitable.
🏢 Internal Only: MEDIUM - Internal attackers or malware could exploit this if credentials remain unchanged.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only knowledge of default credentials, which are shared across devices.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not applicable

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-162-10

Restart Required: No

Instructions:

No official patch exists. Follow CISA advisory recommendations: change default credentials if possible, isolate cameras, and monitor for unauthorized access.

🔧 Temporary Workarounds

Change Default Credentials

all

Change administrative passwords from factory defaults to strong, unique credentials.

Login to camera web interface > Administration > Change Password

Network Segmentation

all

Isolate cameras on separate VLANs with strict firewall rules.

Configure network switches/routers to place cameras on isolated VLAN

🧯 If You Can't Patch

  • Segment cameras from critical networks using firewalls
  • Implement network access control to restrict administrative interface access

🔍 How to Verify

Check if Vulnerable:

Attempt to access camera web interface using default credentials (check vendor documentation for defaults).

Check Version:

Check firmware version in camera web interface > System Information

Verify Fix Applied:

Verify new credentials work and default credentials no longer provide access.

📡 Detection & Monitoring

Log Indicators:

  • Failed login attempts from unknown IPs
  • Successful logins from unexpected locations/times
  • Configuration changes from unauthorized users

Network Indicators:

  • Unusual traffic to camera administrative ports (typically 80, 443, 8080)
  • Traffic from suspicious IPs to camera interfaces

SIEM Query:

source_ip IN (suspicious_ips) AND dest_port IN (80,443,8080) AND url_path CONTAINS "/admin"

🔗 References

📤 Share & Export