An attacker with adjacent access, without authentication, can exploit
this vulnerability to retrieve a hard-coded password embedded in
publicly available software. This password can then be used to decrypt
sensitive network traffic, affecting the Cognex device.
Fixes

Solution

No solution given by the vendor.


Workaround

Cognex reports that In-Sight Explorer based vision systems are legacy products not intended for new applications. To reduce risk, asset owners are advised to switch to next generation In-Sight Vision Suite based vision systems, such as the In-Sight 2800, In-Sight 3800, In-Sight 8900 series embedded cameras.

History

Thu, 18 Sep 2025 21:15:00 +0000

Type Values Removed Values Added
Description An attacker with adjacent access, without authentication, can exploit this vulnerability to retrieve a hard-coded password embedded in publicly available software. This password can then be used to decrypt sensitive network traffic, affecting the Cognex device.
Title Cognex In-Sight Explorer and In-Sight Camera Firmware Use of Hard-coded Password
Weaknesses CWE-259
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-18T21:06:15.053Z

Reserved: 2025-08-06T16:32:41.245Z

Link: CVE-2025-54754

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-18T21:15:48.317

Modified: 2025-09-18T21:15:48.317

Link: CVE-2025-54754

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.