CVE-2025-62674
📋 TL;DR
This vulnerability allows unauthenticated attackers to access RTSP services on affected camera systems, potentially exposing sensitive configuration information. It affects iCAM365 camera systems with specific firmware versions. Organizations using these cameras for surveillance or monitoring are at risk.
💻 Affected Systems
- iCAM365 camera systems
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers gain full access to camera configuration, potentially enabling them to disable cameras, modify settings, or use cameras as entry points into the network.
Likely Case
Unauthorized access to camera feeds and configuration data, potentially exposing sensitive surveillance footage and system settings.
If Mitigated
Limited exposure with proper network segmentation and authentication controls in place.
🎯 Exploit Status
Exploitation requires only network access to RTSP port (typically 554) and knowledge of RTSP protocol.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched firmware versions
Vendor Advisory: https://icam365.net/en/aboutUs/
Restart Required: Yes
Instructions:
1. Check current firmware version
2. Download latest firmware from vendor
3. Apply firmware update following vendor instructions
4. Verify authentication is now required for RTSP access
🔧 Temporary Workarounds
Network Segmentation
allIsolate camera network from internet and sensitive internal networks
Firewall Rules
linuxBlock external access to RTSP port (554/TCP)
iptables -A INPUT -p tcp --dport 554 -j DROP
🧯 If You Can't Patch
- Implement network access controls to restrict RTSP access to authorized systems only
- Deploy cameras in isolated VLANs with strict firewall rules
🔍 How to Verify
Check if Vulnerable:
Attempt to access RTSP stream without authentication using tools like VLC or ffmpeg: ffmpeg -i rtsp://camera-ip:554/stream
Check Version:
Check camera web interface or vendor documentation for firmware version
Verify Fix Applied:
Verify authentication is now required when attempting RTSP access
📡 Detection & Monitoring
Log Indicators:
- Failed authentication attempts on RTSP service
- Unauthorized access to camera configuration
Network Indicators:
- Unusual RTSP traffic from unauthorized IPs
- Port 554 scans
SIEM Query:
source_port=554 AND (NOT authorized_user=*) OR (destination_ip IN camera_subnet)