Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Posted on December 3, 2025December 3, 2025 By CWS

A vital safety vulnerability has been found in Industrial Video & Management’s Longwatch video surveillance system, permitting attackers to execute malicious code with elevated privileges remotely.

The flaw, tracked as CVE-2025-13658, impacts Longwatch variations 6.309 via 6.334 and has acquired a extreme CVSS v4 rating of 9.3.

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) issued an advisory on December 2, 2025, warning organizations in regards to the severe threat.

The vulnerability includes improper code-injection controls, permitting unauthenticated attackers to use the system through easy HTTP GET requests.

As a result of the affected endpoint lacks correct code-signing and execution safeguards, hackers can inject and run arbitrary code with out requiring login credentials. What makes this vulnerability notably harmful is that profitable exploitation grants.

FeatureDescriptionCVE IDCVE-2025-13658VendorIndustrial Video & ControlEquipmentLongwatchVulnerabilityImproper Management of Technology of Code (‘Code Injection’)Affected Versions6.309 to six.334CVSS v4 Score9.3

Attackers’ SYSTEM-level privileges are the very best permission degree in Home windows environments. This implies attackers acquire full management over the compromised system.

Doubtlessly accessing delicate surveillance feeds, modifying configurations, or utilizing the system as a launching level for additional assaults.

Longwatch RCE Vulnerability

The vulnerability impacts vital infrastructure sectors, together with power amenities and water therapy vegetation that depend on Longwatch for video surveillance and monitoring.

Organizations worldwide utilizing affected variations are weak to distant assaults with minimal complexity required.

A involved OT (Operational Know-how) engineer found and reported the vulnerability to CISA, highlighting rising safety consciousness in industrial environments.

Industrial Video & Management has launched model 6.335 to deal with this safety flaw. Organizations operating weak variations ought to instantly improve to the patched model.

CISA recommends further protecting measures: isolating management programs from the web. Implementing firewalls between management and enterprise networks, and utilizing safe VPNs for distant entry.

Presently, no public exploitation makes an attempt have been reported. Nevertheless, the vulnerability’s severity and ease of exploitation make fast patching vital for affected organizations.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Elevated, Execute, Longwatch, Privileges, RCE, Remote, Vulnerability

Post navigation

Previous Post: Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack
Next Post: Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Related Posts

Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Hackers Attacking Fortinet SSL VPN Under Attack From 780 unique IPs Cyber Security News
Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack Canon Allegedly Breached by Clop Ransomware via Oracle E-Business Suite 0-Day Hack Cyber Security News
New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins New Phishing Kit with AI-assisted Development Attacking Microsoft Users to Steal Logins Cyber Security News
Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Farmers Insurance Cyber Attack – 1.1 Million Customers Data Exposed in Salesforce Attack Cyber Security News
EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed Cyber Security News
MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847) MongoBleed Detector Tool Released to Detect MongoDB Vulnerability(CVE-2025-14847) Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News