A vital safety vulnerability has been found in Industrial Video & Management’s Longwatch video surveillance system, permitting attackers to execute malicious code with elevated privileges remotely.
The flaw, tracked as CVE-2025-13658, impacts Longwatch variations 6.309 via 6.334 and has acquired a extreme CVSS v4 rating of 9.3.
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) issued an advisory on December 2, 2025, warning organizations in regards to the severe threat.
The vulnerability includes improper code-injection controls, permitting unauthenticated attackers to use the system through easy HTTP GET requests.
As a result of the affected endpoint lacks correct code-signing and execution safeguards, hackers can inject and run arbitrary code with out requiring login credentials. What makes this vulnerability notably harmful is that profitable exploitation grants.
FeatureDescriptionCVE IDCVE-2025-13658VendorIndustrial Video & ControlEquipmentLongwatchVulnerabilityImproper Management of Technology of Code (‘Code Injection’)Affected Versions6.309 to six.334CVSS v4 Score9.3
Attackers’ SYSTEM-level privileges are the very best permission degree in Home windows environments. This implies attackers acquire full management over the compromised system.
Doubtlessly accessing delicate surveillance feeds, modifying configurations, or utilizing the system as a launching level for additional assaults.
Longwatch RCE Vulnerability
The vulnerability impacts vital infrastructure sectors, together with power amenities and water therapy vegetation that depend on Longwatch for video surveillance and monitoring.
Organizations worldwide utilizing affected variations are weak to distant assaults with minimal complexity required.
A involved OT (Operational Know-how) engineer found and reported the vulnerability to CISA, highlighting rising safety consciousness in industrial environments.
Industrial Video & Management has launched model 6.335 to deal with this safety flaw. Organizations operating weak variations ought to instantly improve to the patched model.
CISA recommends further protecting measures: isolating management programs from the web. Implementing firewalls between management and enterprise networks, and utilizing safe VPNs for distant entry.
Presently, no public exploitation makes an attempt have been reported. Nevertheless, the vulnerability’s severity and ease of exploitation make fast patching vital for affected organizations.
Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.
