Metrics
Affected Vendors & Products
No advisories yet.
Solution
Industrial Video & Control recommends users running versions 6.309 to 6.334 should upgrade to version 6.335 or later to ensure protection against this vulnerability. For more details, view Industrial Video & Control's advisory https://ivcco.com/wp-content/uploads/Longwatch-Security-Bulletin-11-18-2025.pdf .
Workaround
No workaround given by the vendor.
Thu, 04 Dec 2025 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Industrial Video Control
Industrial Video Control longwatch |
|
| Vendors & Products |
Industrial Video Control
Industrial Video Control longwatch |
Tue, 02 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability in Longwatch devices allows unauthenticated HTTP GET requests to execute arbitrary code via an exposed endpoint, due to the absence of code signing and execution controls. Exploitation results in SYSTEM-level privileges. | |
| Title | Industrial Video & Control Longwatch has a Code Injection vulnerability | |
| Weaknesses | CWE-94 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-12-02T21:41:24.753Z
Reserved: 2025-11-25T16:03:10.989Z
Link: CVE-2025-13658
Updated: 2025-12-02T21:41:20.730Z
Status : Awaiting Analysis
Published: 2025-12-02T20:15:50.810
Modified: 2025-12-04T17:15:08.283
Link: CVE-2025-13658
No data.
OpenCVE Enrichment
Updated: 2025-12-04T16:44:38Z