INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h Global vulnerability Industrial Control Systems / IoT / Infrastructure CRITICAL 1h Global phishing Multiple sectors HIGH 2h Global insider Cybersecurity Services CRITICAL 2h Global ransomware Multiple sectors (U.S. companies) CRITICAL 2h Global malware Financial Services, Cryptocurrency CRITICAL 2h Global malware Technology and Cloud Services HIGH 2h Global general Financial Services and E-commerce MEDIUM 2h Global data_breach Social Media and Communications CRITICAL 3h Global general Cybersecurity Operations HIGH 4h Global phishing Technology and Consumer Services HIGH 4h
Vulnerabilities

CVE-2025-66049

High
Vivotek IP7137 Camera RTSP Authentication Bypass Vulnerability
CWE-306 — Weakness Type
Published: Jan 9, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.5
🔗 NVD Official
📄 Description (English)

Vivotek IP7137 camera with firmware version 0200a is vulnerable to an information disclosure issue where live camera footage can be accessed through the RTSP protocol on port 8554 without requiring authentication. This allows unauthorized users with network access to view the camera's feed, potentially compromising user privacy and security. 
The vendor has not replied to the CNA. Possibly all firmware versions are affected. Since the product has met End-Of-Life phase, a fix is not expected to be released.

🤖 AI Executive Summary

Vivotek IP7137 IP cameras contain an authentication bypass vulnerability (CVE-2025-66049) allowing unauthorized access to live video feeds via RTSP protocol on port 8554. The vulnerability affects firmware version 0200a and potentially all versions, with no patch expected as the product has reached end-of-life status.

📄 Description (Arabic)

تسمح هذه الثغرة الأمنية الحرجة للمهاجمين بالوصول إلى البث المباشر للكاميرات دون الحاجة إلى بيانات اعتماد صحيحة من خلال استغلال نقص المصادقة في بروتوكول RTSP على المنفذ 8554. يمكن لأي مستخدم لديه وصول إلى الشبكة مشاهدة البث المباشر للكاميرا، مما يشكل انتهاكاً خطيراً للخصوصية والأمن. نظراً لأن المنتج وصل إلى مرحلة نهاية العمر الافتراضي، لم يستجب المورّد ولا يُتوقع إصدار تحديث أمني. تتطلب هذه الثغرة اتخاذ إجراءات فورية لاستبدال الأجهزة المتأثرة أو عزلها عن الشبكة.

🤖 ملخص تنفيذي (AI)

تحتوي كاميرات Vivotek IP7137 على ثغرة تجاوز المصادقة (CVE-2025-66049) تسمح بالوصول غير المصرح به إلى البث المباشر للفيديو عبر بروتوكول RTSP على المنفذ 8554. تؤثر الثغرة على إصدار البرنامج الثابت 0200a وربما جميع الإصدارات، ولا يُتوقع إصدار تصحيح حيث وصل المنتج إلى مرحلة نهاية العمر الافتراضي.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 08:07
🇸🇦 Saudi Arabia Impact Assessment
Saudi organizations using Vivotek IP7137 cameras face significant privacy and security risks, particularly in critical sectors like government facilities, healthcare institutions, and financial services where surveillance systems monitor sensitive areas. The lack of authentication allows potential unauthorized surveillance of restricted areas, violating PDPL requirements and NCA security controls.
🏢 Affected Saudi Sectors
القطاع الحكومي القطاع المالي والمصرفي القطاع الصحي قطاع التعليم قطاع الطاقة والمرافق قطاع الاتصالات وتقنية المعلومات القطاع التجاري والتجزئة
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately disconnect all Vivotek IP7137 cameras from network access or isolate them in a separate VLAN with strict firewall rules blocking external access to port 8554
2. Replace affected cameras with current-generation IP cameras from vendors with active security support and implement network segmentation to prevent unauthorized RTSP access
3. Conduct a comprehensive audit of all IP camera deployments to identify similar end-of-life devices and establish a lifecycle management policy requiring replacement before EOL status
🔧 خطوات المعالجة (العربية)
1. فصل جميع كاميرات Vivotek IP7137 فوراً عن الوصول إلى الشبكة أو عزلها في شبكة VLAN منفصلة مع قواعد جدار حماية صارمة تحظر الوصول الخارجي إلى المنفذ 8554
2. استبدال الكاميرات المتأثرة بكاميرات IP من الجيل الحالي من موردين يقدمون دعماً أمنياً نشطاً وتطبيق تقسيم الشبكة لمنع الوصول غير المصرح به عبر بروتوكول RTSP
3. إجراء مراجعة شاملة لجميع عمليات نشر كاميرات IP لتحديد الأجهزة المماثلة التي وصلت لنهاية عمرها الافتراضي وإنشاء سياسة إدارة دورة الحياة تتطلب الاستبدال قبل الوصول لحالة نهاية العمر
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
1-2-1 (Asset Management) 2-1-1 (Network Security) 3-1-1 (Access Control) 4-1-1 (Vulnerability Management)
🔵 SAMA CSF
CCC-01 (Cybersecurity Controls) CCC-04 (Network Security) CCC-06 (Access Management) TRM-01 (Third-Party Risk Management)
🟡 ISO 27001:2022
A.8.1.4 (Return of Assets) A.9.1.2 (Access to Networks and Network Services) A.12.6.1 (Management of Technical Vulnerabilities) A.13.1.1 (Network Controls)
📦 Affected Products / CPE 1 entries
vivotek:ip7137_firmware:0200a
📊 CVSS Score
7.5
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityH — High
IntegrityN — None / Network
AvailabilityN — None / Network
📋 Quick Facts
Severity High
CVSS Score7.5
CWECWE-306
EPSS0.05%
Exploit No
Patch ✓ Yes
Published 2026-01-09
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-306
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.