CVE-2025-57440
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-09-22

Last updated on: 2025-10-28

Assigner: MITRE

Description
The Blackmagic ATEM Mini Pro 2.7 exposes an undocumented Telnet service on TCP port 9993, which accepts unauthenticated plaintext commands for controlling streaming, recording, formatting storage devices, and system reboot. This interface, referred to as the "ATEM Ethernet Protocol 1.0", provides complete device control without requiring credentials or encryption. An attacker on the same network (or with remote access to the exposed port) can exploit this interface to execute arbitrary streaming commands, erase disks, or shut down the device - effectively gaining full remote control.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-09-22
Last Modified
2025-10-28
Generated
2026-05-07
AI Q&A
2025-09-22
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
blackmagic atem_mini_pro *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-400 The product does not properly control the allocation and maintenance of a limited resource.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Blackmagic ATEM Mini Pro 2.7 has an undocumented Telnet service running on TCP port 9993 that accepts unauthenticated plaintext commands. This service, called the ATEM Ethernet Protocol 1.0, allows anyone on the same network or with remote access to the port to control streaming, recording, format storage devices, and reboot the system without needing credentials or encryption.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can gain full remote control of the device, including executing arbitrary streaming commands, erasing disks, or shutting down the device. This could disrupt operations, cause data loss, or allow unauthorized control over streaming content.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

You can detect this vulnerability by scanning your network for devices with TCP port 9993 open, which indicates the presence of the undocumented Telnet service. Using tools like nmap, you can run the command: nmap -p 9993 <target-ip>. Additionally, attempting to connect via telnet to port 9993 (telnet <target-ip> 9993) and checking for an unauthenticated prompt or response can confirm the vulnerability.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include restricting network access to TCP port 9993 by implementing firewall rules to block or limit access to this port, especially from untrusted networks. If possible, disable the Telnet service on the device or isolate the device on a secure network segment. Monitoring network traffic for connections to port 9993 can also help detect exploitation attempts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart