{"id":78278,"date":"2025-09-27T12:34:37","date_gmt":"2025-09-27T12:34:37","guid":{"rendered":""},"modified":"2025-10-03T06:32:00","modified_gmt":"2025-10-03T12:32:00","slug":"cve-2025-54810-unencrypted-user-management-data-exposure-in-cognex-in-sight-explorer-and-in-sight-camera-firmware","status":"publish","type":"post","link":"https:\/\/www.ameeba.com\/blog\/cve-2025-54810-unencrypted-user-management-data-exposure-in-cognex-in-sight-explorer-and-in-sight-camera-firmware\/","title":{"rendered":"<strong>CVE-2025-54810: Unencrypted User Management Data Exposure in Cognex In-Sight Explorer and In-Sight Camera Firmware<\/strong>"},"content":{"rendered":"<p><strong>Overview<\/strong><\/p>\n<p>The cybersecurity community is being alerted to a new vulnerability discovered in Cognex In-Sight Explorer and In-Sight Camera Firmware that exposes users to potential system compromise or data leakage. This vulnerability, designated as CVE-2025-54810, involves a proprietary protocol exposed on TCP port 1069 that is used to perform management operations. This is a serious issue as the user <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-53691-deserialization-of-untrusted-data-vulnerability-in-sitecore-experience-manager-and-platform\/\"  data-wpil-monitor-id=\"87798\">management functionality handles sensitive data<\/a>, such as registered usernames and passwords over an unencrypted channel. If unaddressed, this <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-8067-udisks-daemon-vulnerability-leading-to-potential-system-compromise-or-data-leakage\/\"  data-wpil-monitor-id=\"85721\">vulnerability could potentially<\/a> allow an attacker to intercept valid credentials and gain unauthorized access to the device.<\/p>\n<p><strong>Vulnerability Summary<\/strong><\/p>\n<p>CVE ID: CVE-2025-54810<br \/>\nSeverity: High (CVSS: 8.0)<br \/>\nAttack Vector: Network<br \/>\nPrivileges Required: None<br \/>\nUser Interaction: None<br \/>\nImpact: <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-22404-potential-system-compromise-due-to-use-after-free-vulnerability\/\"  data-wpil-monitor-id=\"85696\">System compromise<\/a>, Data leakage<\/p>\n<p><strong>Affected Products<\/strong><\/p><div id=\"ameeb-3910367972\" class=\"ameeb-content-2 ameeb-entity-placement\"><div style=\"border-left: 4px solid #555; padding-left: 20px; margin: 48px 0; font-family: Roboto, sans-serif; color: #ffffff; line-height: 1.6; max-width: 700px;\">\r\n  <h2 style=\"margin-top: 0; font-size: 20px; font-weight: 600; display: flex; align-items: center;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"display: inline-flex; align-items: center; margin-right: 8px;\">\r\n      <img decoding=\"async\" src=\"https:\/\/www.ameeba.com\/blog\/wp-content\/uploads\/2025\/10\/Best-App-icon-Ameeba.png\" alt=\"Ameeba Chat Icon\" style=\"width: 40px; height: 40px;\" \/>\r\n    <\/a>\r\n    A new way to communicate\r\n  <\/h2>\r\n\r\n  <p style=\"margin-bottom: 12px;\">\r\n    Ameeba Chat is built on encrypted identity, not personal profiles.\r\n  <\/p>\r\n\r\n  <p style=\"margin-bottom: 16px;\">\r\n    Message, call, share files, and coordinate with identities kept separate.\r\n  <\/p>\r\n\r\n  <ul style=\"list-style: none; padding-left: 0; margin-bottom: 20px;\">\r\n    <li>\u2022 Encrypted identity<\/li>\r\n    <li>\u2022 Ameeba Chat authenticates access<\/li>\r\n    <li>\u2022 Aliases and categories<\/li>\r\n    <li>\u2022 End-to-end encrypted chat, calls, and files<\/li>\r\n    <li>\u2022 Secure notes for sensitive information<\/li>\r\n  <\/ul>\r\n\r\n  <p style=\"font-style: italic; font-weight: 600; margin-bottom: 24px;\">\r\n    Private communication, rethought.\r\n  <\/p>\r\n\r\n  <div style=\"display: flex; flex-wrap: wrap; gap: 12px;\">\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\/download\" style=\"background-color: #ffffff; color: #000000; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Download Ameeba Chat<\/a>\r\n    <a href=\"https:\/\/www.ameeba.com\/chat\" style=\"border: 1px solid #ffffff; color: #ffffff; padding: 10px 20px; text-decoration: none; border-radius: 6px; font-weight: 500;\">Learn More<\/a>\r\n  <\/div>\r\n<\/div>\r\n<\/div>\n<p>Product | Affected Versions<\/p>\n<p>Cognex In-Sight Explorer | All versions prior to patch<br \/>\nCognex In-Sight Camera Firmware | All versions prior to patch<\/p>\n<p><strong>How the Exploit Works<\/strong><\/p>\n<p>The <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-58280-object-heap-address-exposure-vulnerability-in-ark-ets\/\"  data-wpil-monitor-id=\"87216\">vulnerability stems from the exposure<\/a> of a proprietary protocol on TCP port 1069. This protocol is used to perform management operations, which include the handling of sensitive <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-35451-unchangeable-hard-coded-credentials-in-ptzoptics-cameras-expose-users-to-data-leakage\/\"  data-wpil-monitor-id=\"88209\">user data<\/a> such as usernames and passwords. Since this data is transmitted over an unencrypted channel, it can be intercepted by an attacker who is in the same network segment (adjacent attacker). Once the attacker has these credentials, they can gain <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-52954-unauthorized-root-access-vulnerability-in-junos-os-evolved\/\"  data-wpil-monitor-id=\"88207\">unauthorized access<\/a> to the device.<\/p>\n<p><strong>Conceptual Example Code<\/strong><\/p><div id=\"ameeb-1295924700\" class=\"ameeb-content ameeb-entity-placement\"><div class=\"poptin-embedded\" data-id=\"f6b387694f681\"><\/div>\r\n\r\n\r\n\r\n\r\n\r\n<\/div>\n<p>An adjacent attacker may use a packet sniffer to intercept the <a href=\"https:\/\/www.ameeba.com\/blog\/cve-2025-45080-unencrypted-communication-vulnerability-in-yono-sbi-banking-lifestyle-v1-23-36\/\"  data-wpil-monitor-id=\"92116\">unencrypted communication<\/a>. Conceptually, it might look like this:<\/p>\n<pre><code class=\"\" data-line=\"\"># Using tcpdump to capture packets on TCP port 1069\ntcpdump -i eth0 &#039;tcp port 1069 and ((ip[2:2] - ((ip[0]&amp;0xf)&lt;&lt;2)) - ((tcp[12]&amp;0xf0)&gt;&gt;2) != 0)&#039;\n# This will produce an output of packets, among which the attacker could potentially find unencrypted usernames and passwords<\/code><\/pre>\n<p>Please note that the above is a conceptual example and does not represent a real-world exploit code. It is included for illustrative purposes only to help understand the nature of the vulnerability.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview The cybersecurity community is being alerted to a new vulnerability discovered in Cognex In-Sight Explorer and In-Sight Camera Firmware that exposes users to potential system compromise or data leakage. This vulnerability, designated as CVE-2025-54810, involves a proprietary protocol exposed on TCP port 1069 that is used to perform management operations. This is a serious [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"footnotes":""},"categories":[1],"tags":[],"vendor":[],"product":[],"attack_vector":[],"asset_type":[],"severity":[],"exploit_status":[],"class_list":["post-78278","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/78278","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/comments?post=78278"}],"version-history":[{"count":7,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/78278\/revisions"}],"predecessor-version":[{"id":85325,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/posts\/78278\/revisions\/85325"}],"wp:attachment":[{"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/media?parent=78278"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/categories?post=78278"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/tags?post=78278"},{"taxonomy":"vendor","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/vendor?post=78278"},{"taxonomy":"product","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/product?post=78278"},{"taxonomy":"attack_vector","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/attack_vector?post=78278"},{"taxonomy":"asset_type","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/asset_type?post=78278"},{"taxonomy":"severity","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/severity?post=78278"},{"taxonomy":"exploit_status","embeddable":true,"href":"https:\/\/www.ameeba.com\/blog\/wp-json\/wp\/v2\/exploit_status?post=78278"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}