Cyber Posture

CVE-2026-4475

High

Published: 20 March 2026

Published
20 March 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.7th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-4475 is a high-severity Use of Hard-coded Password (CWE-259) vulnerability. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Local Accounts (T1078.003); ranked at the 7.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 CM-7 (Least Functionality) and SC-7 (Boundary Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Local Accounts (T1078.003) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Monitors and controls communications at external and key internal boundaries, preventing local network attackers from exploiting the hard-coded credentials in the ipc function.

prevent

Restricts the camera to essential capabilities by prohibiting or restricting unnecessary ports, protocols, or services like the vulnerable home/web/ipc endpoint.

prevent

Requires secure management of authenticators, which prohibits reliance on hard-coded credentials and supports selection of devices without such flaws.

MITRE ATT&CK Enterprise TechniquesAI

T1078.003 Local Accounts Stealth
Adversaries may obtain and abuse credentials of a local account as a means of gaining Initial Access, Persistence, Privilege Escalation, or Defense Evasion.
T1552.001 Credentials In Files Credential Access
Adversaries may search local file systems and remote file shares for files containing insecurely stored credentials.
Why these techniques?

Hard-coded credentials embedded in device file directly provide valid local accounts for adjacent-network authentication (T1078.003) and constitute unsecured credentials stored in files (T1552.001), enabling initial device compromise.

Confidence: MEDIUM · MITRE ATT&CK Enterprise v18.1

NVD Description

A vulnerability has been found in Yi Technology YI Home Camera 2 2.1.1_20171024151200. The affected element is an unknown function of the file home/web/ipc. Such manipulation leads to hard-coded credentials. Access to the local network is required for this attack…

more

to succeed. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Deeper analysisAI

CVE-2026-4475 is a vulnerability involving hard-coded credentials in an unknown function of the file home/web/ipc in Yi Technology YI Home Camera 2 version 2.1.1_20171024151200. It is classified under CWE-259 and CWE-798, with a CVSS v3.1 base score of 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H). The issue was published on 2026-03-20.

Attackers with access to the local network can exploit this vulnerability without requiring privileges or user interaction. Successful exploitation grants high-impact access to confidentiality, integrity, and availability, potentially allowing full compromise of the affected camera device.

VulDB advisories indicate that the exploit has been publicly disclosed and may be used. The vendor was contacted early regarding the disclosure but provided no response, with no patches or official mitigations mentioned.

Details

CWE(s)

CVEs Like This One

CVE-2025-14115Shared CWE-798
CVE-2026-26334Shared CWE-798
CVE-2025-70802Shared CWE-259
CVE-2026-6574Shared CWE-259, CWE-798
CVE-2025-8730Shared CWE-259, CWE-798
CVE-2025-8974Shared CWE-259, CWE-798
CVE-2026-29120Shared CWE-798
CVE-2025-25428Shared CWE-259
CVE-2026-2616Shared CWE-259, CWE-798
CVE-2025-2322Shared CWE-259, CWE-798

References