Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Critical IDIS IP Cameras One-Click Vulnerability Leads to full Compromise of Victim’s Computer

Posted on January 29, 2026January 29, 2026 By CWS

A extreme safety flaw in IDIS IP cameras has emerged, permitting attackers to achieve full management over a sufferer’s pc with only one click on.

The vulnerability, tracked as CVE-2025-12556, targets the IDIS Cloud Supervisor (ICM) Viewer, a Home windows-based utility used to watch surveillance feeds from IDIS IP cameras deployed throughout enterprises, manufacturing services, and army installations worldwide.

With a CVSS rating of 8.7, this flaw represents a vital risk that might remodel routine surveillance techniques into entry factors for network-wide breaches.

IDIS, a South Korea-based video surveillance producer, gives an built-in cloud administration answer that connects IP cameras, community video recorders, and video administration software program by way of its ICM platform.

The vulnerability allows risk actors to execute malicious code on the host machine by tricking victims into clicking on a specifically crafted hyperlink.

IDIS documentation explains the IDIS cloud structure (Supply – Claroty)

Whereas customers are sometimes warned towards clicking untrusted hyperlinks, this safety flaw escalates the hazard considerably by breaking out of the browser’s protecting sandbox and executing code instantly on the Home windows working system.

After the second paragraph, Claroty researchers recognized the weak spot throughout their investigation into fashionable cloud-enabled surveillance ecosystems.

Their evaluation revealed that the ICM Viewer’s structure comprises a number of safety oversights that, when mixed, create a harmful assault pathway.

The flaw stems from a Home windows service referred to as CWGService.exe, which listens on native port 16140 and accepts instructions to launch the ICM Viewer with particular parameters.

The IDIS Cloud Supervisor internet portal dashboard (Supply – Claroty)

As a result of this service fails to validate the origin of incoming instructions or sanitize enter arguments, attackers can inject malicious directions by way of a WebSocket connection initiated by JavaScript code on a malicious web site.

As soon as exploited, the vulnerability grants attackers full entry to the compromised system, enabling them to steal delicate knowledge, set up further malware, or transfer laterally throughout the community to focus on different units.

This presents a very alarming situation for organizations counting on IDIS surveillance techniques, as a single compromised workstation may function a springboard for assaults towards the broader infrastructure, together with surveillance cameras and significant enterprise techniques.

Assault Mechanism and Technical Exploitation

The exploitation course of leverages a design flaw in how the ICM Viewer processes command-line arguments handed from the CWGService element.

The ICM Viewer is constructed on the Chromium Embedded Framework (CEF), which accepts varied command-line flags to change browser conduct.

Attackers found they might inject the –utility-cmd-prefix debugging flag into the execution chain, permitting them to wrap the viewer’s utility processes with arbitrary instructions.

By internet hosting a malicious webpage containing JavaScript that connects to the native WebSocket service, attackers can ship encrypted messages with injected arguments that set off code execution when an unsuspecting person visits the web page.

The method explorer showcases the execution of ICM viewer and its subprocesses (Supply – Claroty)

The assault requires no authentication past convincing the sufferer to click on a hyperlink, making it notably efficient for spear-phishing campaigns.

Claroty researchers efficiently demonstrated the exploit by injecting instructions that launched Notepad, proving the idea’s viability for extra malicious payloads.

CISA has issued an advisory urging all IDIS ICM Viewer customers to instantly improve to model 1.7.1 or uninstall the software program if not in use.

Organizations should act swiftly to patch their techniques, as the mixture of excessive severity and ease of exploitation makes this vulnerability a gorgeous goal for risk actors looking for community entry by way of IoT units.

Observe us on Google Information, LinkedIn, and X to Get Extra On the spot Updates, Set CSN as a Most well-liked Supply in Google.

Cyber Security News Tags:Cameras, Compromise, Computer, Critical, Full, IDIS, Leads, OneClick, Victims, Vulnerability

Post navigation

Previous Post: eScan Antivirus Update Server Hacked to Push Malicious Update packages
Next Post: 3 Decisions CISOs Need to Make to Prevent Downtime Risk in 2026

Related Posts

Hacktivist Group Claimed Attacks Across 20+ Critical Sectors Following Iran–Israel Conflict Cyber Security News
Managing Data Subject Access Requests in Compliance Programs Cyber Security News
Critical GoAnywhere MFT Platform Vulnerability Exposes Enterprises to Remote Exploitation Cyber Security News
Hackers Weaponizing Windows LNK File UI Misrepresentation Remote Code Execution Vulnerability Cyber Security News
Microsoft Patch Tuesday July 2025: 130 Vulnerabilities Fixed Including 41 RCE Cyber Security News
Microsoft Windows 11 October Update Breaks Localhost (127.0.0.1) Connections Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Matanbuchus Malware Downloader Evading AV Detections by Changing Components
  • Google Announces Android Theft Protection Feature to Make Your Device Harder Target for Hackers
  • LLMs Hijacked, Monetized in ‘Operation Bizarre Bazaar’
  • N8n Vulnerabilities Could Lead to Remote Code Execution
  • CISA Warns of FortiCloud SSO Authentication Bypass Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Matanbuchus Malware Downloader Evading AV Detections by Changing Components
  • Google Announces Android Theft Protection Feature to Make Your Device Harder Target for Hackers
  • LLMs Hijacked, Monetized in ‘Operation Bizarre Bazaar’
  • N8n Vulnerabilities Could Lead to Remote Code Execution
  • CISA Warns of FortiCloud SSO Authentication Bypass Vulnerability Exploited in Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark