CVE-2025-32730

MEDIUM

i-PRO Configuration Tool - Auth Bypass

Title source: llm
STIX 2.1

Description

Use of hard-coded cryptographic key vulnerability in i-PRO Configuration Tool affects the network system for i-PRO Co., Ltd. surveillance cameras and recorders. This vulnerability allows a local authenticated attacker to use the authentication information from the last connected surveillance cameras and recorders.

Scores

CVSS v3 5.5
EPSS 0.0005
EPSS Percentile 16.2%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-321
Status published
Products (1)
i-PRO Co., Ltd./i-PRO Configuration Tool see the information provided by the vendor
Published Apr 24, 2025
Tracked Since Feb 18, 2026