CVE-2025-30183

| EUVD-2025-17581 HIGH
2025-06-09 [email protected]
7.5
CVSS 3.1
Share

CVSS VectorNVD

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

6
Analysis Updated
Apr 16, 2026 - 06:43 EUVD-patch-fix
executive_summary
Re-analysis Queued
Apr 16, 2026 - 05:29 backfill_euvd_patch
patch_released
patch_available
Apr 16, 2026 - 05:29 EUVD
22.0.1
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17581
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
CVE Published
Jun 09, 2025 - 23:15 nvd
HIGH 7.5

DescriptionNVD

CyberData 011209 Intercom does not properly store or protect web server admin credentials.

AnalysisAI

CyberData 011209 Intercom devices fail to properly store or protect web server administrator credentials, allowing unauthenticated remote attackers to obtain plaintext or weakly protected credentials with high confidence. This vulnerability (CVSS 7.5) affects web-based administrative interfaces and could lead to complete compromise of device configuration and control. No public exploit code or active KEV listing is confirmed at this time, but the vulnerability requires immediate attention due to the critical nature of credential exposure in networked intercom systems.

Technical ContextAI

The CyberData 011209 Intercom is a networked audio/communication device that exposes administrative functions through an HTTP(S) web interface. The vulnerability stems from CWE-522 (Insufficiently Protected Credentials), indicating that admin credentials are either stored in plaintext, using weak encoding (e.g., base64), hardcoded in firmware, or transmitted without encryption. The affected device likely uses a proprietary or legacy web server implementation that does not follow secure credential storage best practices (no salting, hashing, or encryption). CPE context suggests this affects the CyberData 011209 model specifically; similar CyberData intercom products may share architectural vulnerabilities. The web admin interface is the attack surface, with network accessibility being the primary concern (AV:N).

RemediationAI

  1. IMMEDIATE: Restrict network access to the web administrative interface using firewall rules; limit access to trusted administrator IP addresses/subnets only. 2. URGENT: Contact CyberData for a firmware security update addressing credential storage. Check https://www.cyberdata.net/ for security advisories and patch releases. 3. If a patch is available, schedule firmware update on affected 011209 devices immediately. 4. Change all administrative credentials immediately after patching. 5. INTERIM MITIGATION: If internet-facing, move the device behind a VPN or bastion host; disable remote web access if not operationally required. 6. Review device access logs for unauthorized credential access attempts. 7. Implement network segmentation so compromised device credentials cannot be leveraged for lateral movement. Note: Specific patch version/release date not provided; vendor advisory link needed from CyberData security team.

Share

CVE-2025-30183 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy