CVE-2025-67160
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-02

Last updated on: 2026-01-08

Assigner: MITRE

Description
An issue in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files via a directory traversal.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-02
Last Modified
2026-01-08
Generated
2026-05-07
AI Q&A
2026-01-02
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
vatilon vatilon to 1.12.37-20240124 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-22 The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Vatilon v1.12.37-20240124 allows attackers to access sensitive directories and files through directory traversal because the embedded web server enables directory indexing without authentication. This exposes internal web directories containing HTML, JavaScript, and CGI components meant only for authenticated users. Attackers can access internal scripts, configuration pages, and sensitive implementation details, including API endpoints and request parameters, some of which contain cleartext credentials. This lets attackers study the web interface and replicate API requests to perform unauthorized actions. [1]


How can this vulnerability impact me? :

The vulnerability can lead to remote information disclosure without authentication or user interaction, exposing sensitive internal files and credentials. While it does not directly allow configuration changes or code execution, it significantly increases the risk of secondary exploits such as authentication bypass or unauthorized configuration access when combined with other vulnerabilities. This can compromise the security of the affected devices and potentially lead to further attacks. [1]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring web server logs for abnormal directory access attempts to exposed directories such as /cgi-bin/, /view/, /css/, /img/, /img2/, /js/, /js2/, and /onvif/. You can use commands like 'grep' on your web server access logs to find requests to these directories, for example: grep -E "/cgi-bin/|/view/|/css/|/img/|/img2/|/js/|/js2/|/onvif/" /var/log/httpd/access_log. Additionally, network traffic analysis tools like tcpdump or Wireshark can be used to capture and inspect HTTP requests for unauthorized access patterns or cleartext credentials being sent to endpoints such as /view/player.html or /cgi-bin/web.cgi. [1]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include disabling directory indexing on the embedded web server, enforcing authentication checks before serving internal directories and static resources, restricting access to CGI handlers and management interfaces, and removing sensitive information and credentials from client-side scripts. Applying vendor-provided firmware updates is also recommended. Additionally, monitoring web server logs for abnormal directory access attempts can help detect exploitation attempts. [1]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability allows unauthenticated attackers to access sensitive directories and files, including internal API endpoints and credentials transmitted in cleartext. This exposure of sensitive information could lead to unauthorized data disclosure, which may violate data protection requirements under standards like GDPR and HIPAA. Therefore, the vulnerability negatively impacts compliance by increasing the risk of unauthorized access to sensitive data. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart