Cognex In-Sight Explorer and In-Sight Camera Firmware expose
a service implementing a proprietary protocol on TCP port 1069 to allow
the client-side software, such as the In-Sight Explorer tool, to perform
management operations such as changing network settings or modifying
users' access to the device.
Advisories
Source ID Title
EUVD EUVD EUVD-2025-30227 Cognex In-Sight Explorer and In-Sight Camera Firmware expose a service implementing a proprietary protocol on TCP port 1069 to allow the client-side software, such as the In-Sight Explorer tool, to perform management operations such as changing network settings or modifying users' access to the device.
Fixes

Solution

No solution given by the vendor.


Workaround

Cognex reports that In-Sight Explorer based vision systems are legacy products not intended for new applications. To reduce risk, asset owners are advised to switch to next generation In-Sight Vision Suite based vision systems, such as the In-Sight 2800, In-Sight 3800, In-Sight 8900 series embedded cameras.

History

Fri, 19 Sep 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 19 Sep 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Cognex
Cognex in-sight Camera Firmware
Cognex in-sight Explorer
Vendors & Products Cognex
Cognex in-sight Camera Firmware
Cognex in-sight Explorer

Thu, 18 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
Description Cognex In-Sight Explorer and In-Sight Camera Firmware expose a service implementing a proprietary protocol on TCP port 1069 to allow the client-side software, such as the In-Sight Explorer tool, to perform management operations such as changing network settings or modifying users' access to the device.
Title Cognex In-Sight Explorer and In-Sight Camera Firmware Client-Side Enforcement of Server-Side Security
Weaknesses CWE-602
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-19T13:10:58.750Z

Reserved: 2025-08-06T16:32:41.324Z

Link: CVE-2025-53969

cve-icon Vulnrichment

Updated: 2025-09-19T13:10:55.408Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-09-18T22:15:44.363

Modified: 2025-09-19T16:00:27.847

Link: CVE-2025-53969

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-09-19T09:35:21Z