Home

Description

Beward Intercom 2.3.1 contains a credentials disclosure vulnerability that allows local attackers to access plain-text authentication credentials stored in an unencrypted database file. Attackers can read the BEWARD.INTERCOM.FDB file to extract usernames and passwords, enabling unauthorized access to IP cameras and door stations.

PUBLISHED Reserved 2025-12-24 | Published 2025-12-24 | Updated 2025-12-24 | Assigner VulnCheck




MEDIUM: 6.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N
MEDIUM: 6.2CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

Plaintext Storage of a Password

Product status

2.3.1.34471
affected

2.3.0
affected

2.2.11
affected

2.2.10.5
affected

2.2.9
affected

2.2.8.9
affected

2.2.7.4
affected

Credits

LiquidWorm as Gjoko Krstic of Zero Science Lab finder

References

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5505.php exploit

www.exploit-db.com/exploits/46267 (ExploitDB-46267) exploit

www.beward.net (Beward Product Homepage) product

www.zeroscience.mk/en/vulnerabilities/ZSL-2019-5505.php (Zero Science Lab Disclosure (ZSL-2019-5505)) third-party-advisory

cve.org (CVE-2018-25130)

nvd.nist.gov (CVE-2018-25130)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.