CVSS VectorNVD
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Lifecycle Timeline
6DescriptionNVD
CyberData 011209 Intercom does not properly store or protect web server admin credentials.
AnalysisAI
CyberData 011209 Intercom devices fail to properly store or protect web server administrator credentials, allowing unauthenticated remote attackers to obtain plaintext or weakly protected credentials with high confidence. This vulnerability (CVSS 7.5) affects web-based administrative interfaces and could lead to complete compromise of device configuration and control. No public exploit code or active KEV listing is confirmed at this time, but the vulnerability requires immediate attention due to the critical nature of credential exposure in networked intercom systems.
Technical ContextAI
The CyberData 011209 Intercom is a networked audio/communication device that exposes administrative functions through an HTTP(S) web interface. The vulnerability stems from CWE-522 (Insufficiently Protected Credentials), indicating that admin credentials are either stored in plaintext, using weak encoding (e.g., base64), hardcoded in firmware, or transmitted without encryption. The affected device likely uses a proprietary or legacy web server implementation that does not follow secure credential storage best practices (no salting, hashing, or encryption). CPE context suggests this affects the CyberData 011209 model specifically; similar CyberData intercom products may share architectural vulnerabilities. The web admin interface is the attack surface, with network accessibility being the primary concern (AV:N).
RemediationAI
- IMMEDIATE: Restrict network access to the web administrative interface using firewall rules; limit access to trusted administrator IP addresses/subnets only. 2. URGENT: Contact CyberData for a firmware security update addressing credential storage. Check https://www.cyberdata.net/ for security advisories and patch releases. 3. If a patch is available, schedule firmware update on affected 011209 devices immediately. 4. Change all administrative credentials immediately after patching. 5. INTERIM MITIGATION: If internet-facing, move the device behind a VPN or bastion host; disable remote web access if not operationally required. 6. Review device access logs for unauthorized credential access attempts. 7. Implement network segmentation so compromised device credentials cannot be leveraged for lateral movement. Note: Specific patch version/release date not provided; vendor advisory link needed from CyberData security team.
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17581