Impact
GeoVision GV-IP Device Utility 9.0.5.0 fails to properly secure its device authentication mechanism. The username and password are encrypted in broadcast UDP packets, but the symmetric key is also transmitted, allowing anyone on the same LAN to recover the credentials. Once decrypted, an attacker can issue privileged commands to reconfigure or reset the device, effectively taking full control of its configuration and operation.
Affected Systems
The vulnerability exists in GeoVision Inc. GV‑IP Device Utility, specifically the 9.0.5.0 release. The vendor has provided a patch in version 9.0.7.0. Systems that have not yet applied this update are at risk.
Risk and Exploitability
With a CVSS score of 9.3, this flaw is considered critical. Exploitation requires access to the local LAN and the ability to capture broadcast traffic; no additional credentials or privileges are needed to deposit the packet. Once an attacker obtains the cleared credentials, they gain full administrative control of the device. The EPSS score is not available, and the flaw is not currently listed in CISA’s KEV catalog, but its high impact and direct attack path make it a serious threat for any exposed network.
OpenCVE Enrichment