CVE-2025-62674

6.8 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to access RTSP services on affected camera systems, potentially exposing sensitive configuration information. It affects iCAM365 camera systems with specific firmware versions. Organizations using these cameras for surveillance or monitoring are at risk.

💻 Affected Systems

Products:
  • iCAM365 camera systems
Versions: Specific firmware versions mentioned in CISA advisory ICSA-25-324-02
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects systems with RTSP services enabled and lacking proper authentication controls.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full access to camera configuration, potentially enabling them to disable cameras, modify settings, or use cameras as entry points into the network.

🟠

Likely Case

Unauthorized access to camera feeds and configuration data, potentially exposing sensitive surveillance footage and system settings.

🟢

If Mitigated

Limited exposure with proper network segmentation and authentication controls in place.

🌐 Internet-Facing: HIGH - Directly exposed RTSP services without authentication can be easily discovered and exploited from the internet.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could still exploit this, but requires network access.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to RTSP port (typically 554) and knowledge of RTSP protocol.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific patched firmware versions

Vendor Advisory: https://icam365.net/en/aboutUs/

Restart Required: Yes

Instructions:

1. Check current firmware version
2. Download latest firmware from vendor
3. Apply firmware update following vendor instructions
4. Verify authentication is now required for RTSP access

🔧 Temporary Workarounds

Network Segmentation

all

Isolate camera network from internet and sensitive internal networks

Firewall Rules

linux

Block external access to RTSP port (554/TCP)

iptables -A INPUT -p tcp --dport 554 -j DROP

🧯 If You Can't Patch

  • Implement network access controls to restrict RTSP access to authorized systems only
  • Deploy cameras in isolated VLANs with strict firewall rules

🔍 How to Verify

Check if Vulnerable:

Attempt to access RTSP stream without authentication using tools like VLC or ffmpeg: ffmpeg -i rtsp://camera-ip:554/stream

Check Version:

Check camera web interface or vendor documentation for firmware version

Verify Fix Applied:

Verify authentication is now required when attempting RTSP access

📡 Detection & Monitoring

Log Indicators:

  • Failed authentication attempts on RTSP service
  • Unauthorized access to camera configuration

Network Indicators:

  • Unusual RTSP traffic from unauthorized IPs
  • Port 554 scans

SIEM Query:

source_port=554 AND (NOT authorized_user=*) OR (destination_ip IN camera_subnet)

🔗 References

📤 Share & Export