CVE-2025-9265
BaseFortify
Publication date: 2025-10-13
Last updated on: 2025-10-14
Assigner: Switzerland Government Common Vulnerability Program
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| kiloview | ndi_n30 | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-290 | This attack-focused weakness is caused by incorrectly implemented authentication schemes that are subject to spoofing attacks. |
| CWE-346 | The product does not properly verify that the source of data or communication is valid. |
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a broken authorization flaw in the Kiloview NDI N30 device. It allows a remote attacker who is not authenticated to bypass user verification. This means the attacker can perform actions that change the device's state, which should normally only be done by administrators.
How can this vulnerability impact me? :
The vulnerability can allow an unauthenticated remote attacker to take control over administrative functions of the Kiloview NDI N30 device. This could lead to unauthorized changes in the device's configuration or operation, potentially disrupting services or compromising the security and integrity of the system.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, update the Kiloview NDI N30 firmware to a version later than 2.02.0246, as this issue was fixed in firmware versions after that.