CVE-2025-67070

8.2 HIGH

📋 TL;DR

This vulnerability allows unauthenticated attackers to bypass multi-factor authentication during password recovery on Intelbras CFTV IP cameras. Attackers can change the admin password and gain full administrative access to the device. Organizations using the affected Intelbras camera models are at risk.

💻 Affected Systems

Products:
  • Intelbras CFTV IP NVD 9032 R
Versions: Ftd V2.800.00IB00C.0.T
Operating Systems: Embedded firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Specific firmware version is vulnerable; other versions may also be affected but unconfirmed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of surveillance system, allowing attackers to disable cameras, exfiltrate footage, pivot to internal networks, or use cameras as foothold for further attacks.

🟠

Likely Case

Unauthorized access to camera administrative panel leading to surveillance disruption, footage manipulation, or credential theft.

🟢

If Mitigated

Limited impact if cameras are isolated on separate VLANs with strict network segmentation and access controls.

🌐 Internet-Facing: HIGH - IP cameras are often exposed to internet for remote access, making them prime targets for exploitation.
🏢 Internal Only: MEDIUM - Internal attackers or compromised devices could exploit this to gain camera access and potentially pivot to other systems.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept code is publicly available on GitHub, making exploitation trivial for attackers with basic skills.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: Unknown

Restart Required: No

Instructions:

Check Intelbras website for firmware updates. If available, download latest firmware and follow vendor upgrade procedures.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate cameras on separate VLAN with strict firewall rules preventing external access to administrative interfaces.

Access Control Lists

all

Implement IP-based restrictions allowing only authorized management stations to access camera administrative interfaces.

🧯 If You Can't Patch

  • Disable remote administrative access and require physical access for camera management
  • Implement network monitoring for suspicious authentication attempts and password reset activities

🔍 How to Verify

Check if Vulnerable:

Attempt password recovery process without MFA verification. If password can be reset without proper authentication, device is vulnerable.

Check Version:

Check camera web interface or use vendor-specific CLI commands to display firmware version

Verify Fix Applied:

Test password recovery process to confirm MFA is properly enforced before allowing password changes.

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed MFA attempts followed by successful password reset
  • Admin password change from unexpected IP addresses
  • Authentication bypass attempts in web server logs

Network Indicators:

  • HTTP POST requests to password recovery endpoints without proper authentication headers
  • Unusual traffic patterns to camera administrative interfaces

SIEM Query:

source="camera_logs" AND (event="password_reset" OR event="admin_login") AND result="success" AND auth_method!="mfa"

🔗 References

📤 Share & Export