Cognex In-Sight Explorer and In-Sight Camera Firmware expose

a proprietary protocol on TCP port 1069 to perform management operations
such as modifying system properties. The user management functionality
handles sensitive data such as registered usernames and passwords over
an unencrypted channel, allowing an adjacent attacker to intercept valid
credentials to gain access to the device.
Fixes

Solution

No solution given by the vendor.


Workaround

Cognex reports that In-Sight Explorer based vision systems are legacy products not intended for new applications. To reduce risk, asset owners are advised to switch to next generation In-Sight Vision Suite based vision systems, such as the In-Sight 2800, In-Sight 3800, In-Sight 8900 series embedded cameras.

History

Thu, 18 Sep 2025 21:45:00 +0000

Type Values Removed Values Added
Description Cognex In-Sight Explorer and In-Sight Camera Firmware expose a proprietary protocol on TCP port 1069 to perform management operations such as modifying system properties. The user management functionality handles sensitive data such as registered usernames and passwords over an unencrypted channel, allowing an adjacent attacker to intercept valid credentials to gain access to the device.
Title Cognex In-Sight Explorer and In-Sight Camera Firmware Authentication Bypass by Capture-replay
Weaknesses CWE-294
References
Metrics cvssV3_1

{'score': 8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: icscert

Published:

Updated: 2025-09-18T21:28:19.297Z

Reserved: 2025-08-06T16:32:41.319Z

Link: CVE-2025-54810

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2025-09-18T22:15:46.403

Modified: 2025-09-18T22:15:46.403

Link: CVE-2025-54810

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.