Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Posted on December 3, 2025December 3, 2025 By CWS

A vital safety vulnerability has been found in Industrial Video & Management’s Longwatch video surveillance system, permitting attackers to execute malicious code with elevated privileges remotely.

The flaw, tracked as CVE-2025-13658, impacts Longwatch variations 6.309 via 6.334 and has acquired a extreme CVSS v4 rating of 9.3.

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) issued an advisory on December 2, 2025, warning organizations in regards to the severe threat.

The vulnerability includes improper code-injection controls, permitting unauthenticated attackers to use the system through easy HTTP GET requests.

As a result of the affected endpoint lacks correct code-signing and execution safeguards, hackers can inject and run arbitrary code with out requiring login credentials. What makes this vulnerability notably harmful is that profitable exploitation grants.

FeatureDescriptionCVE IDCVE-2025-13658VendorIndustrial Video & ControlEquipmentLongwatchVulnerabilityImproper Management of Technology of Code (‘Code Injection’)Affected Versions6.309 to six.334CVSS v4 Score9.3

Attackers’ SYSTEM-level privileges are the very best permission degree in Home windows environments. This implies attackers acquire full management over the compromised system.

Doubtlessly accessing delicate surveillance feeds, modifying configurations, or utilizing the system as a launching level for additional assaults.

Longwatch RCE Vulnerability

The vulnerability impacts vital infrastructure sectors, together with power amenities and water therapy vegetation that depend on Longwatch for video surveillance and monitoring.

Organizations worldwide utilizing affected variations are weak to distant assaults with minimal complexity required.

A involved OT (Operational Know-how) engineer found and reported the vulnerability to CISA, highlighting rising safety consciousness in industrial environments.

Industrial Video & Management has launched model 6.335 to deal with this safety flaw. Organizations operating weak variations ought to instantly improve to the patched model.

CISA recommends further protecting measures: isolating management programs from the web. Implementing firewalls between management and enterprise networks, and utilizing safe VPNs for distant entry.

Presently, no public exploitation makes an attempt have been reported. Nevertheless, the vulnerability’s severity and ease of exploitation make fast patching vital for affected organizations.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Elevated, Execute, Longwatch, Privileges, RCE, Remote, Vulnerability

Post navigation

Previous Post: Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack
Next Post: Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Related Posts

Huge Wave of Malicious Efimer Malicious Script Attack Users via WordPress Sites, Malicious Torrents, and Email Cyber Security News
Record-Breaking 15 Tbps DDoS Attack From 500,000+ Devices Hits Azure Network Cyber Security News
LummaStealer Technical Details Uncovered Using ML-Based Detection Approach Cyber Security News
UNC3886 Actors Know for Exploiting 0-Days Attacking Singapore’s Critical Infrastructure Cyber Security News
Beware of Fake Bitcoin Tool That Hides DarkComet RAT Malware With it Cyber Security News
Cloudflare Confirms Data Breach, Hackers Stole Customer Data from Salesforce Instances Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New Scanner Tool for Detecting Exposed ReactJS and Next.js RSC Endpoints (CVE-2025-55182)
  • New Report Warns of 68% Of Actively Serving Phishing Kits Protected by CloudFlare
  • Record 29.7 Tbps DDoS Attack Linked to AISURU Botnet with up to 4 Million Infected Hosts
  • Operation DupeHike Attacking Employees Using Weaponized Documents DUPERUNNER Malware
  • Threat Actors Using Malicious VSCode Extension to Deploy Anivia Loader and OctoRAT

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark