PatchSiren cyber security CVE debrief
CVE-2025-30184 CyberData CVE debrief
CVE-2025-30184 is a critical vulnerability in CyberData's 011209 SIP Emergency Intercom. CISA’s advisory states that an unauthenticated user could access the device’s web interface through an alternate path. The affected version range is listed as CyberData 011209 SIP Emergency Intercom versions prior to 22.0.1. CyberData’s remediation is to update to v22.0.1.
- Vendor
- CyberData
- Product
- 011209 SIP Emergency Intercom
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2025-06-05
- Original CVE updated
- 2025-06-05
- Advisory published
- 2025-06-05
- Advisory updated
- 2025-06-05
Who should care
Organizations that deploy CyberData 011209 SIP Emergency Intercom devices, especially asset owners and administrators responsible for OT, physical security, or facility communication systems, should review this immediately. Security teams that manage externally reachable or broadly accessible device management interfaces should also prioritize it.
Technical summary
The CISA CSAF advisory for ICSA-25-155-01 identifies CVE-2025-30184 with CVSS 3.1 9.8/Critical and vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H. The issue is described as an alternate-path access problem that could let an unauthenticated user reach the Web Interface. The advisory lists CyberData 011209 SIP Emergency Intercom <22.0.1 as affected and recommends updating to 22.0.1.
Defensive priority
Immediate. The vulnerability is unauthenticated, network-reachable by nature of the described access path, and scored Critical. The most direct risk reduction is to patch to the vendor-fixed release as soon as operationally possible.
Recommended defensive actions
- Update CyberData 011209 SIP Emergency Intercom devices to version 22.0.1 or later.
- Inventory deployments of the affected model and confirm which units are running versions earlier than 22.0.1.
- Review access controls for device management interfaces and restrict administrative reachability to trusted management networks.
- If patching must be staged, place compensating controls around the web interface and monitor for unexpected access attempts.
- Track the CISA advisory ICSA-25-155-01 and vendor guidance for any follow-up remediation notes.
Evidence notes
Primary evidence comes from the CISA CSAF advisory source item for ICSA-25-155-01, which names the affected product, version boundary (<22.0.1), CVSS vector, and the vendor mitigation to update to 22.0.1. The CVE record and CISA advisory link corroborate the public disclosure on 2025-06-05. No KEV listing was provided in the source corpus.
Official resources
-
CVE-2025-30184 CVE record
CVE.org
-
CVE-2025-30184 NVD detail
NVD
-
Source item URL
cisa_csaf
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
-
Source reference
Reference
Publicly disclosed by CISA on 2025-06-05 in advisory ICSA-25-155-01. This debrief uses the CVE publication date as the timing reference.