PatchSiren

PatchSiren cyber security CVE debrief

CVE-2025-35452 PTZOptics CVE debrief

CVE-2025-35452 is a Critical authentication weakness affecting PTZOptics and possibly other ValueHD-based pan-tilt-zoom cameras. CISA’s advisory says the administrative web interface uses a default, shared password, and the affected firmware spans multiple PTZOptics, multiCAM Systems, SMTAV, and ValueHD product lines. PTZOptics says the issue has been patched in production firmware for the current generation of devices, while the advisory points other affected vendors to direct contact pages for coordination.

Vendor
PTZOptics
Product
PTZOptics PT12X-SDI-xx-G2
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2025-06-12
Original CVE updated
2025-06-12
Advisory published
2025-06-12
Advisory updated
2025-06-12

Who should care

Security teams, AV/IT administrators, and facilities operators responsible for PTZOptics, ValueHD, multiCAM Systems, or SMTAV pan-tilt-zoom cameras should treat this as urgent. It is especially relevant where cameras are reachable from business networks, remote management segments, or any environment that relies on the web admin interface.

Technical summary

The advisory describes a default, shared password on the cameras’ administrative web interface. The published CVSS v3.1 vector is AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, which indicates a network-reachable issue with no prior privileges or user interaction required and potential for high impact to confidentiality, integrity, and availability. CISA lists 26 affected product entries across multiple PTZOptics and related camera families, including both all-versions entries and version-bounded firmware ranges. The advisory notes that PTZOptics has provided fixes for affected versions, but ValueHD, multiCAM Systems, and SMTAV did not respond to coordination requests in the advisory context.

Defensive priority

Urgent. This should be prioritized for immediate asset inventory, exposure review, and remediation because the issue is remotely reachable, requires no authentication according to the CVSS vector, and may permit full administrative compromise if the shared default password is present.

Recommended defensive actions

  • Inventory all PTZOptics, ValueHD, multiCAM Systems, and SMTAV PTZ camera deployments, including any rebranded or OEM-derived devices.
  • Identify whether any devices expose the administrative web interface beyond tightly controlled management networks.
  • Apply vendor fixes where available, using PTZOptics’ Known Vulnerabilities and Fixes page for the listed PTZOptics products.
  • For devices without a vendor fix path in the advisory, follow the vendor contact pages cited by CISA and plan compensating controls until a remediation is available.
  • Replace any default or shared administrative credentials with unique, strong credentials where the device supports it.
  • Restrict administrative interface access with network segmentation, ACLs, or management-jump-host patterns.
  • Monitor for unauthorized configuration changes, unexpected account usage, or other signs of device tampering.
  • Validate firmware versions against the affected ranges listed in the advisory before and after remediation.

Evidence notes

All claims in this debrief are limited to the supplied CISA CSAF advisory metadata and its referenced official links. The core issue statement comes from the advisory description: PTZOptics and possibly other ValueHD-based cameras use a default, shared password for the administrative web interface. The affected scope is drawn from the CSAF product tree listing 26 affected product entries. The severity and attack characteristics are drawn from the published CVSS v3.1 vector included in the source item. The remediation statements are limited to the advisory’s listed mitigation entries, including PTZOptics’ fix page and the vendor contact pages for ValueHD, multiCAM Systems, and SMTAV. No exploit details or unsupported operational claims are included.

Official resources

CISA published the advisory on 2025-06-12T06:00:00.000Z. The source item revision history shows an initial publication only, with no later modifications in the supplied corpus. This debrief reflects the advisory state at publication time.