CVE-2025-57432
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-22

Last updated on: 2025-10-14

Assigner: MITRE

Description
Blackmagic Web Presenter version 3.3 exposes a Telnet service on port 9977 that accepts unauthenticated commands. This service allows remote attackers to manipulate stream settings, including changing video modes and possibly altering device functionality. No credentials or authentication mechanisms are required to interact with the Telnet interface.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-22
Last Modified
2025-10-14
Generated
2026-05-07
AI Q&A
2025-09-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 4 associated CPEs
Vendor Product Version / Range
blackmagicdesign web_presenter_hd_firmware 3.3
blackmagicdesign web_presenter_hd *
blackmagicdesign web_presenter_4k_firmware 3.3
blackmagicdesign web_presenter_4k *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-306 The product does not perform any authentication for functionality that requires a provable user identity or consumes a significant amount of resources.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

Blackmagic Web Presenter version 3.3 has a vulnerability where it exposes a Telnet service on port 9977 that accepts commands without requiring any authentication. This means remote attackers can connect to this service and manipulate stream settings, such as changing video modes or potentially altering the device's functionality, without needing any credentials.


How can this vulnerability impact me? :

This vulnerability can allow remote attackers to control and manipulate the device's streaming settings and functionality without authorization. This could lead to unauthorized changes in video output, disruption of streaming services, or misuse of the device, potentially impacting the reliability and security of your streaming operations.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by scanning your network for devices running Blackmagic Web Presenter version 3.3 that have port 9977 open. Using a network scanning tool like nmap, you can run the command: nmap -p 9977 <target-ip>. If the port is open and responds, it indicates the Telnet service is exposed and potentially vulnerable. Additionally, attempting to connect via Telnet to port 9977 (e.g., telnet <target-ip> 9977) and checking if commands can be issued without authentication can confirm the vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling or blocking access to the Telnet service on port 9977 on the Blackmagic Web Presenter device. This can be done by configuring firewall rules to block incoming connections to port 9977 or by disabling the Telnet service if possible. Additionally, restricting network access to trusted hosts only and monitoring for any unauthorized access attempts can help reduce risk until a patch or update is available.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart