Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Longwatch RCE Vulnerability Let Attackers Execute Remote Code With Elevated Privileges

Posted on December 3, 2025December 3, 2025 By CWS

A vital safety vulnerability has been found in Industrial Video & Management’s Longwatch video surveillance system, permitting attackers to execute malicious code with elevated privileges remotely.

The flaw, tracked as CVE-2025-13658, impacts Longwatch variations 6.309 via 6.334 and has acquired a extreme CVSS v4 rating of 9.3.

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) issued an advisory on December 2, 2025, warning organizations in regards to the severe threat.

The vulnerability includes improper code-injection controls, permitting unauthenticated attackers to use the system through easy HTTP GET requests.

As a result of the affected endpoint lacks correct code-signing and execution safeguards, hackers can inject and run arbitrary code with out requiring login credentials. What makes this vulnerability notably harmful is that profitable exploitation grants.

FeatureDescriptionCVE IDCVE-2025-13658VendorIndustrial Video & ControlEquipmentLongwatchVulnerabilityImproper Management of Technology of Code (‘Code Injection’)Affected Versions6.309 to six.334CVSS v4 Score9.3

Attackers’ SYSTEM-level privileges are the very best permission degree in Home windows environments. This implies attackers acquire full management over the compromised system.

Doubtlessly accessing delicate surveillance feeds, modifying configurations, or utilizing the system as a launching level for additional assaults.

Longwatch RCE Vulnerability

The vulnerability impacts vital infrastructure sectors, together with power amenities and water therapy vegetation that depend on Longwatch for video surveillance and monitoring.

Organizations worldwide utilizing affected variations are weak to distant assaults with minimal complexity required.

A involved OT (Operational Know-how) engineer found and reported the vulnerability to CISA, highlighting rising safety consciousness in industrial environments.

Industrial Video & Management has launched model 6.335 to deal with this safety flaw. Organizations operating weak variations ought to instantly improve to the patched model.

CISA recommends further protecting measures: isolating management programs from the web. Implementing firewalls between management and enterprise networks, and utilizing safe VPNs for distant entry.

Presently, no public exploitation makes an attempt have been reported. Nevertheless, the vulnerability’s severity and ease of exploitation make fast patching vital for affected organizations.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attackers, Code, Elevated, Execute, Longwatch, Privileges, RCE, Remote, Vulnerability

Post navigation

Previous Post: Hackers Can Weaponize Claude Skills to Execute MedusaLocker Ransomware Attack
Next Post: Critical RSC Bugs in React and Next.js Allow Unauthenticated Remote Code Execution

Related Posts

Avoid Fake Traffic Ticket Sites Stealing Your Data Avoid Fake Traffic Ticket Sites Stealing Your Data Cyber Security News
New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting New Phantom Stealer Campaign Hits Windows Machines Through ISO Mounting Cyber Security News
Microsoft Exchange Server Vulnerability Enables Privelege Escalation Microsoft Exchange Server Vulnerability Enables Privelege Escalation Cyber Security News
Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers Xillen Stealer With New Advanced Features Evade AI Detection and Steal Sensitive Data from Password Managers Cyber Security News
Ni8mare Vulnerability Let Attackers Hijack n8n Servers Ni8mare Vulnerability Let Attackers Hijack n8n Servers Cyber Security News
Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Insecure GitHub Actions in Open Source Projects MITRE and Splunk Exposes Critical Vulnerabilities Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks
  • Cyber Threats Concealed by Compromised IoT Devices

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News