CVE-2025-64770

6.8 MEDIUM

📋 TL;DR

This vulnerability allows unauthenticated attackers to access ONVIF services on affected camera systems, exposing sensitive configuration information. It affects network cameras and surveillance systems that use vulnerable ONVIF implementations. Organizations using these devices for physical security monitoring are at risk.

💻 Affected Systems

Products:
  • Network cameras with vulnerable ONVIF implementations
Versions: Specific versions not detailed in provided references
Operating Systems: Embedded camera firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with ONVIF services enabled and exposed to network access

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain complete control over camera systems, disable surveillance, manipulate footage, or use cameras as entry points to internal networks.

🟠

Likely Case

Attackers access camera configuration data, potentially discovering network layouts, credentials, or other sensitive operational information.

🟢

If Mitigated

Limited exposure of non-critical configuration details with no access to live feeds or control functions.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Unauthenticated access simplifies exploitation; specific exploit details not publicly documented

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Not specified

Vendor Advisory: https://www.cisa.gov/news-events/ics-advisories/icsa-25-324-02

Restart Required: No

Instructions:

1. Check vendor website for firmware updates
2. Apply available patches following vendor instructions
3. Verify ONVIF service configuration after update

🔧 Temporary Workarounds

Network Segmentation

all

Isolate camera networks from general corporate networks and internet access

Disable ONVIF Services

all

Turn off ONVIF services if not required for operations

🧯 If You Can't Patch

  • Implement strict network access controls to limit ONVIF service exposure
  • Enable authentication on ONVIF services if supported by device

🔍 How to Verify

Check if Vulnerable:

Attempt unauthenticated access to ONVIF services on camera IP addresses (typically port 80, 443, or 8899)

Check Version:

Check device web interface or use ONVIF Device Manager tool

Verify Fix Applied:

Test that unauthenticated ONVIF requests now require authentication or are blocked

📡 Detection & Monitoring

Log Indicators:

  • Unauthenticated ONVIF requests
  • Multiple failed authentication attempts on camera services

Network Indicators:

  • Unusual ONVIF protocol traffic from external IPs
  • Port scanning targeting camera service ports

SIEM Query:

source_ip=external AND dest_port IN (80,443,8899) AND protocol=ONVIF AND auth_result=failed

🔗 References

📤 Share & Export