Cyber Posture

CVE-2025-66050

Critical

Published: 09 January 2026

Published
09 January 2026
Modified
14 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0006 19.2th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66050 is a critical-severity Use of Default Password (CWE-1393) vulnerability in Vivotek Ip7137 Firmware. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Default Accounts (T1078.001); ranked at the 19.2th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 AC-14 (Permitted Actions Without Identification or Authentication) and IA-5 (Authenticator Management).

Threat & Defense at a Glance

What attackers do: exploitation maps to Default Accounts (T1078.001) and 2 other techniques. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Prohibits use of end-of-life Vivotek IP7137 cameras with unsupported firmware vulnerable to default administrator authentication bypass.

prevent

Requires changing default authenticators prior to first use, directly mitigating the empty password allowing unauthenticated administrator login.

prevent

Limits and documents permitted actions without identification or authentication, preventing exposure of administrator functions without credentials.

MITRE ATT&CK Enterprise TechniquesAI

T1078.001 Default Accounts Stealth
Adversaries may obtain and abuse credentials of a default account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1133 External Remote Services Persistence
Adversaries may leverage external-facing remote services to initially access and/or persist within a network.
T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Default/no-password admin account on network-exposed camera admin interface directly enables unauthenticated remote access and full device control.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Vivotek IP7137 camera with firmware version 0200a by default dos not require to provide any password when logging in as an administrator. While it is possible to set up such a password, a user is not informed about such a…

more

need. The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

Deeper analysisAI

CVE-2025-66050 is a critical authentication bypass vulnerability affecting the Vivotek IP7137 IP camera running firmware version 0200a. By default, the device does not require a password for administrator login, despite the option to configure one existing. Users are not prompted or informed about the need to set a password, leaving the admin interface exposed. The issue is tracked under CWE-1393 and carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). All firmware versions may be vulnerable, as the vendor has not responded to the CNA.

Remote attackers require no privileges or user interaction to exploit this vulnerability over the network. An unauthenticated adversary can log in directly as an administrator, gaining full control over the camera. This allows high-impact compromise of confidentiality, integrity, and availability, such as viewing live feeds, modifying configurations, or disrupting device operations.

The referenced advisory at https://cert.pl/posts/2026/01/CVE-2025-66049 notes that the vendor has not replied to coordination efforts. The product has reached end-of-life, so no patches or fixes are expected to be released.

Security practitioners should isolate or decommission affected Vivotek IP7137 cameras, as no mitigations are available from the vendor. Network segmentation and monitoring for unauthorized admin access are recommended interim controls.

Details

CWE(s)

Affected Products

vivotek
ip7137 firmware
0200a

CVEs Like This One

CVE-2025-66049Same product: Vivotek Ip7137
CVE-2025-66052Same product: Vivotek Ip7137
CVE-2025-26793Shared CWE-1393
CVE-2026-24429Shared CWE-1393
CVE-2024-49559Shared CWE-1393
CVE-2025-2347Shared CWE-1393
CVE-2026-33784Shared CWE-1393
CVE-2025-22938Shared CWE-1393
CVE-2025-26701Shared CWE-1393
CVE-2025-14917Shared CWE-1393

References