PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-30184 CyberData CVE debrief

CVE-2025-30184 is a critical vulnerability in CyberData's 011209 SIP Emergency Intercom. CISA’s advisory states that an unauthenticated user could access the device’s web interface through an alternate path. The affected version range is listed as CyberData 011209 SIP Emergency Intercom versions prior to 22.0.1. CyberData’s remediation is to update to v22.0.1.

Vendor
CyberData
Product
011209 SIP Emergency Intercom
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-06-05
Original CVE updated
2025-06-05
Advisory published
2025-06-05
Advisory updated
2025-06-05

Who should care

Organizations that deploy CyberData 011209 SIP Emergency Intercom devices, especially asset owners and administrators responsible for OT, physical security, or facility communication systems, should review this immediately. Security teams that manage externally reachable or broadly accessible device management interfaces should also prioritize it.

Technical summary

The CISA CSAF advisory for ICSA-25-155-01 identifies CVE-2025-30184 with CVSS 3.1 9.8/Critical and vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is described as an alternate-path access problem that could let an unauthenticated user reach the Web Interface. The advisory lists CyberData 011209 SIP Emergency Intercom <22.0.1 as affected and recommends updating to 22.0.1.

Defensive priority

Immediate. The vulnerability is unauthenticated, network-reachable by nature of the described access path, and scored Critical. The most direct risk reduction is to patch to the vendor-fixed release as soon as operationally possible.

Recommended defensive actions

  • Update CyberData 011209 SIP Emergency Intercom devices to version 22.0.1 or later.
  • Inventory deployments of the affected model and confirm which units are running versions earlier than 22.0.1.
  • Review access controls for device management interfaces and restrict administrative reachability to trusted management networks.
  • If patching must be staged, place compensating controls around the web interface and monitor for unexpected access attempts.
  • Track the CISA advisory ICSA-25-155-01 and vendor guidance for any follow-up remediation notes.

Evidence notes

Primary evidence comes from the CISA CSAF advisory source item for ICSA-25-155-01, which names the affected product, version boundary (<22.0.1), CVSS vector, and the vendor mitigation to update to 22.0.1. The CVE record and CISA advisory link corroborate the public disclosure on 2025-06-05. No KEV listing was provided in the source corpus.

Official resources

Publicly disclosed by CISA on 2025-06-05 in advisory ICSA-25-155-01. This debrief uses the CVE publication date as the timing reference.