Refine your search

1 vulnerability found for by Vivotek

CVE-2025-12592 (GCVE-0-2025-12592)
Vulnerability from cvelistv5
Published
2025-11-19 12:30
Modified
2025-11-19 16:07
CWE
Summary
Legacy Vivotek Device firmware uses default credetials for the root and user login accounts.
Impacted products
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2025-12592",
                "options": [
                  {
                    "Exploitation": "none"
                  },
                  {
                    "Automatable": "yes"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2025-11-19T16:07:31.532330Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2025-11-19T16:07:56.677Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "collectionURL": "https://ftpmirror.your.org/pub/misc/ftp.vivotek.com/Firmware/",
          "defaultStatus": "unaffected",
          "modules": [
            "Firmware"
          ],
          "product": "Affected device model numbers are FD7131-VVTK,FD7131-VVTK,FD7131-VVTK,FD7141-VVTK,IP7131-VVTK,IP7133-VVTK,IP7133-VVTK,IP7133-VVTK,IP7134-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7135-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7137-VVTK,IP7138-VVTK,IP7142-VVTK,IP7142-VVTK,IP7151-VVTK,IP7152-VVTK,IP7153-VVTK,IP7153-VVTK,IP7154-VVTK,IP7330-VVTK,IP7330-VVTK,IP7330-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131-VVTK,IP8131W-VVTK,PT7135-VVTK,PT7137-TCON,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PT7137-VVTK,PZ7131-VVTK,PZ7131-VVTK,PZ71X1-VVTK,PZ71X1-VVTK,PZ71X2-VVTK,SD73X3-VVTK,SD73X3-VVTK,SD73X3-VVTK,TC5330-VVTK,TC5332-TCVV,TC5333-TCVV,TC5633-TCVV,TC5633-VVTK,VS7100-VVTK,VS7100-VVTK,VS7100-VVTK",
          "vendor": "Vivotek",
          "versions": [
            {
              "status": "affected",
              "version": "0100b",
              "versionType": "custom"
            },
            {
              "status": "affected",
              "version": "0100e"
            },
            {
              "status": "affected",
              "version": "0100e1"
            },
            {
              "status": "affected",
              "version": "0100e2"
            },
            {
              "status": "affected",
              "version": "0100f"
            },
            {
              "status": "affected",
              "version": "0100g"
            },
            {
              "status": "affected",
              "version": "0100i"
            },
            {
              "status": "affected",
              "version": "0101c"
            },
            {
              "status": "affected",
              "version": "0103c"
            },
            {
              "status": "affected",
              "version": "0199z"
            },
            {
              "status": "affected",
              "version": "0200a"
            },
            {
              "status": "affected",
              "version": "0200b"
            },
            {
              "status": "affected",
              "version": "0200c"
            },
            {
              "status": "affected",
              "version": "0200g"
            },
            {
              "status": "affected",
              "version": "0201a"
            },
            {
              "status": "affected",
              "version": "0201a1"
            },
            {
              "status": "affected",
              "version": "0201c"
            },
            {
              "status": "affected",
              "version": "0201k"
            },
            {
              "status": "affected",
              "version": "0202a"
            },
            {
              "status": "affected",
              "version": "0202b"
            },
            {
              "status": "affected",
              "version": "0203a"
            },
            {
              "status": "affected",
              "version": "0300a"
            },
            {
              "status": "affected",
              "version": "0300b"
            },
            {
              "status": "affected",
              "version": "0301b3"
            },
            {
              "status": "affected",
              "version": "0302a"
            },
            {
              "status": "affected",
              "version": "0302c"
            },
            {
              "status": "affected",
              "version": "0400a"
            },
            {
              "status": "affected",
              "version": "0400b"
            },
            {
              "status": "affected",
              "version": "0401a"
            },
            {
              "status": "affected",
              "version": "0500a"
            },
            {
              "status": "affected",
              "version": "0500b"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "type": "finder",
          "value": "Larry W. Cashdollar"
        }
      ],
      "datePublic": "2025-11-02T17:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Legacy Vivotek Device firmware uses default credetials for the root and user login accounts."
            }
          ],
          "value": "Legacy Vivotek Device firmware uses default credetials for the root and user login accounts."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "Public"
            }
          ],
          "value": "Public"
        }
      ],
      "impacts": [
        {
          "capecId": "CAPEC-70",
          "descriptions": [
            {
              "lang": "en",
              "value": "CAPEC-70 Try Common or Default Usernames and Passwords"
            }
          ]
        }
      ],
      "metrics": [
        {
          "cvssV4_0": {
            "Automatable": "YES",
            "Recovery": "NOT_DEFINED",
            "Safety": "NOT_DEFINED",
            "attackComplexity": "LOW",
            "attackRequirements": "NONE",
            "attackVector": "NETWORK",
            "baseScore": 9.3,
            "baseSeverity": "CRITICAL",
            "exploitMaturity": "PROOF_OF_CONCEPT",
            "privilegesRequired": "NONE",
            "providerUrgency": "RED",
            "subAvailabilityImpact": "HIGH",
            "subConfidentialityImpact": "HIGH",
            "subIntegrityImpact": "HIGH",
            "userInteraction": "NONE",
            "valueDensity": "NOT_DEFINED",
            "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/E:P/AU:Y/U:Red",
            "version": "4.0",
            "vulnAvailabilityImpact": "HIGH",
            "vulnConfidentialityImpact": "HIGH",
            "vulnIntegrityImpact": "HIGH",
            "vulnerabilityResponseEffort": "NOT_DEFINED"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-1392",
              "description": "CWE-1392 CWE-1392: Use of Default Credentials",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2025-11-19T12:30:32.854Z",
        "orgId": "461b2335-328f-427d-ae3d-eff7d6814455",
        "shortName": "larry_cashdollar"
      },
      "references": [
        {
          "url": "https://www.akamai.com/blog/security-research/rce-zero-day-in-legacy-vivotek-firmware"
        },
        {
          "url": "http://www.vapidlabs.com/advisory.php?v=219"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "Use of default login credentials in Legacy Vivotek Devices",
      "x_generator": {
        "engine": "Vulnogram 0.5.0"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "461b2335-328f-427d-ae3d-eff7d6814455",
    "assignerShortName": "larry_cashdollar",
    "cveId": "CVE-2025-12592",
    "datePublished": "2025-11-19T12:30:32.854Z",
    "dateReserved": "2025-11-01T12:15:08.915Z",
    "dateUpdated": "2025-11-19T16:07:56.677Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.2"
}