Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-30796 | The Blackmagic ATEM Mini Pro 2.7 exposes sensitive device and stream configuration information via an unauthenticated Telnet service on port 9990. Upon connection, the attacker can access a protocol preamble that leaks the video mode, routing configuration, input/output labels, device model, and even internal identifiers such as the unique ID. This can be used for reconnaissance and planning further attacks. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 17 Oct 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Blackmagicdesign
Blackmagicdesign atem Mini Pro Blackmagicdesign atem Mini Pro Firmware |
|
CPEs | cpe:2.3:h:blackmagicdesign:atem_mini_pro:-:*:*:*:*:*:*:* cpe:2.3:o:blackmagicdesign:atem_mini_pro_firmware:2.7:*:*:*:*:*:*:* |
|
Vendors & Products |
Blackmagicdesign
Blackmagicdesign atem Mini Pro Blackmagicdesign atem Mini Pro Firmware |
Tue, 23 Sep 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Blackmagic
Blackmagic atem Mini Pro |
|
Vendors & Products |
Blackmagic
Blackmagic atem Mini Pro |
Mon, 22 Sep 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-200 | |
Metrics |
cvssV3_1
|
Mon, 22 Sep 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Blackmagic ATEM Mini Pro 2.7 exposes sensitive device and stream configuration information via an unauthenticated Telnet service on port 9990. Upon connection, the attacker can access a protocol preamble that leaks the video mode, routing configuration, input/output labels, device model, and even internal identifiers such as the unique ID. This can be used for reconnaissance and planning further attacks. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2025-09-22T17:41:16.675Z
Reserved: 2025-08-17T00:00:00.000Z
Link: CVE-2025-57441

Updated: 2025-09-22T17:40:43.159Z

Status : Analyzed
Published: 2025-09-22T18:15:45.953
Modified: 2025-10-17T20:34:42.913
Link: CVE-2025-57441

No data.

Updated: 2025-09-23T16:09:46Z