We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-5124

Sony SNC-M1 Administrative Interface default credentials



Description

EN DE

A vulnerability classified as critical has been found in Sony SNC-M1, SNC-M3, SNC-RZ25N, SNC-RZ30N, SNC-DS10, SNC-CS3N and SNC-RX570N up to 1.30. This affects an unknown part of the component Administrative Interface. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. It is recommended to change the configuration settings. The vendor was contacted early about this issue. They confirmed the existence but pointed out that they "have published the 'Hardening Guide' on the Web from July 2018 to January 2025 and have thoroughly informed customers of the recommendation to change their initial passwords".

Es wurde eine Schwachstelle in Sony SNC-M1, SNC-M3, SNC-RZ25N, SNC-RZ30N, SNC-DS10, SNC-CS3N and SNC-RX570N bis 1.30 entdeckt. Sie wurde als kritisch eingestuft. Dabei betrifft es einen unbekannter Codeteil der Komponente Administrative Interface. Durch die Manipulation mit unbekannten Daten kann eine use of default credentials-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Die Komplexität eines Angriffs ist eher hoch. Sie ist schwierig auszunutzen. Der Exploit steht zur öffentlichen Verfügung. Die wahre Existenz der vermeintlichen Schwachstelle wird zur Zeit in Frage gestellt. Als bestmögliche Massnahme werden Anpassungen an der Konfiguration empfohlen.

Reserved 2025-05-23 | Published 2025-05-24 | Updated 2025-05-28 | Assigner VulDB


CRITICAL: 9.2CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.1CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
HIGH: 8.1CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
7.6AV:N/AC:H/Au:N/C:C/I:C/A:C

Problem types

Use of Default Credentials

Product status

1.0
affected

1.1
affected

1.2
affected

1.3
affected

1.4
affected

1.5
affected

1.6
affected

1.7
affected

1.8
affected

1.9
affected

1.10
affected

1.11
affected

1.12
affected

1.13
affected

1.14
affected

1.15
affected

1.16
affected

1.17
affected

1.18
affected

1.19
affected

1.20
affected

1.21
affected

1.22
affected

1.23
affected

1.24
affected

1.25
affected

1.26
affected

1.27
affected

1.28
affected

1.29
affected

1.30
affected

1.0
affected

1.1
affected

1.2
affected

1.3
affected

1.4
affected

1.5
affected

1.6
affected

1.7
affected

1.8
affected

1.9
affected

1.10
affected

1.11
affected

1.12
affected

1.13
affected

1.14
affected

1.15
affected

1.16
affected

1.17
affected

1.18
affected

1.19
affected

1.20
affected

1.21
affected

1.22
affected

1.23
affected

1.24
affected

1.25
affected

1.26
affected

1.27
affected

1.28
affected

1.29
affected

1.30
affected

1.0
affected

1.1
affected

1.2
affected

1.3
affected

1.4
affected

1.5
affected

1.6
affected

1.7
affected

1.8
affected

1.9
affected

1.10
affected

1.11
affected

1.12
affected

1.13
affected

1.14
affected

1.15
affected

1.16
affected

1.17
affected

1.18
affected

1.19
affected

1.20
affected

1.21
affected

1.22
affected

1.23
affected

1.24
affected

1.25
affected

1.26
affected

1.27
affected

1.28
affected

1.29
affected

1.30
affected

1.0
affected

1.1
affected

1.2
affected

1.3
affected

1.4
affected

1.5
affected

1.6
affected

1.7
affected

1.8
affected

1.9
affected

1.10
affected

1.11
affected

1.12
affected

1.13
affected

1.14
affected

1.15
affected

1.16
affected

1.17
affected

1.18
affected

1.19
affected

1.20
affected

1.21
affected

1.22
affected

1.23
affected

1.24
affected

1.25
affected

1.26
affected

1.27
affected

1.28
affected

1.29
affected

1.30
affected

1.0
affected

1.1
affected

1.2
affected

1.3
affected

1.4
affected

1.5
affected

1.6
affected

1.7
affected

1.8
affected

1.9
affected

1.10
affected

1.11
affected

1.12
affected

1.13
affected

1.14
affected

1.15
affected

1.16
affected

1.17
affected

1.18
affected

1.19
affected

1.20
affected

1.21
affected

1.22
affected

1.23
affected

1.24
affected

1.25
affected

1.26
affected

1.27
affected

1.28
affected

1.29
affected

1.30
affected

1.0
affected

1.1
affected

1.2
affected

1.3
affected

1.4
affected

1.5
affected

1.6
affected

1.7
affected

1.8
affected

1.9
affected

1.10
affected

1.11
affected

1.12
affected

1.13
affected

1.14
affected

1.15
affected

1.16
affected

1.17
affected

1.18
affected

1.19
affected

1.20
affected

1.21
affected

1.22
affected

1.23
affected

1.24
affected

1.25
affected

1.26
affected

1.27
affected

1.28
affected

1.29
affected

1.30
affected

1.0
affected

1.1
affected

1.2
affected

1.3
affected

1.4
affected

1.5
affected

1.6
affected

1.7
affected

1.8
affected

1.9
affected

1.10
affected

1.11
affected

1.12
affected

1.13
affected

1.14
affected

1.15
affected

1.16
affected

1.17
affected

1.18
affected

1.19
affected

1.20
affected

1.21
affected

1.22
affected

1.23
affected

1.24
affected

1.25
affected

1.26
affected

1.27
affected

1.28
affected

1.29
affected

1.30
affected

Timeline

2025-05-23:Advisory disclosed
2025-05-23:VulDB entry created
2025-05-23:VulDB entry last update

Credits

zeke (VulDB User) reporter

References

vuldb.com/?id.310203 (VDB-310203 | Sony SNC-M1 Administrative Interface default credentials) vdb-entry

vuldb.com/?ctiid.310203 (VDB-310203 | CTI Indicators (IOB, IOC)) signature permissions-required

vuldb.com/?submit.564839 (Submit #564839 | sony Network Camera SNC <=1.30 Use of Default Credentials) third-party-advisory

github.com/zeke2997/CVE_request_Sony related

github.com/zeke2997/CVE_request_Sony exploit

cve.org (CVE-2025-5124)

nvd.nist.gov (CVE-2025-5124)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-5124

Support options

Helpdesk Chat, Email, Knowledgebase