this vulnerability to retrieve a hard-coded password embedded in
publicly available software. This password can then be used to decrypt
sensitive network traffic, affecting the Cognex device.
Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Cognex reports that In-Sight Explorer based vision systems are legacy products not intended for new applications. To reduce risk, asset owners are advised to switch to next generation In-Sight Vision Suite based vision systems, such as the In-Sight 2800, In-Sight 3800, In-Sight 8900 series embedded cameras.
Thu, 18 Sep 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An attacker with adjacent access, without authentication, can exploit this vulnerability to retrieve a hard-coded password embedded in publicly available software. This password can then be used to decrypt sensitive network traffic, affecting the Cognex device. | |
Title | Cognex In-Sight Explorer and In-Sight Camera Firmware Use of Hard-coded Password | |
Weaknesses | CWE-259 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: icscert
Published:
Updated: 2025-09-18T21:06:15.053Z
Reserved: 2025-08-06T16:32:41.245Z
Link: CVE-2025-54754

No data.

Status : Received
Published: 2025-09-18T21:15:48.317
Modified: 2025-09-18T21:15:48.317
Link: CVE-2025-54754

No data.

No data.