{"vulnerability": "CVE-2024-12569", "sightings": [{"uuid": "5662c01e-767f-4c71-bcfc-08ea2da45d4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12569", "type": "seen", "source": "https://bsky.app/profile/cve-notifications.bsky.social/post/3ldnjyhdq7t2b", "content": "", "creation_timestamp": "2024-12-19T09:16:39.503364Z"}, {"uuid": "8a4f35c9-8efa-4cf7-8893-09bb888a09ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12569", "type": "seen", "source": "https://www.cisa.gov/news-events/ics-advisories/icsa-25-016-03", "content": "", "creation_timestamp": "2025-01-16T11:00:00.000000Z"}, {"uuid": "50f1fe29-4e38-4668-b956-1627e81ad94d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12569", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-16T03:45:02.000000Z"}, {"uuid": "df70958d-9216-442b-9fc4-c732aab4de1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12569", "type": "seen", "source": "MISP/acd0294c-4561-4286-a04e-5c02a1c67b1f", "content": "", "creation_timestamp": "2025-09-15T13:28:32.000000Z"}, {"uuid": "798a9b0b-1633-4dad-8053-e53a2e6a69f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12569", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/389", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-12569\n\ud83d\udd39 Description: Disclosure\nof sensitive information in a Milestone XProtect Device Pack driver\u2019s log file for third-party cameras, allows an attacker to read camera\ncredentials stored in the Recording Server under specific conditions.\n\ud83d\udccf Published: 2024-12-19T08:41:33.342Z\n\ud83d\udccf Modified: 2025-01-07T09:58:47.238Z\n\ud83d\udd17 References:\n1. https://supportcommunity.milestonesys.com/KBRedir?art=000067740&amp;lang=en_US", "creation_timestamp": "2025-01-07T10:36:32.000000Z"}, {"uuid": "338755da-05db-41d4-9fe3-1acfa52f9d3c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-12569", "type": "seen", "source": "https://t.me/cvedetector/13315", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-12569 - HikVision XProtect Device Pack Log File Disclosure\", \n  \"Content\": \"CVE ID : CVE-2024-12569 \nPublished : Dec. 19, 2024, 9:16 a.m. | 19\u00a0minutes ago \nDescription : Disclosure of sensitive information in HikVision camera driver's log file in XProtect Device Pack allows an attacker to read camera credentials stored in the Recording Server under specific conditions. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"19 Dec 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-12-19T10:38:16.000000Z"}]}