MERCURY MIPC252W IP camera 1.0.5 Build 230306 Rel.79931n contains an improper authentication vulnerability in the RTSP service. After successful Digest authentication in an initial DESCRIBE request, the device does not verify the Digest response parameter in subsequent RTSP requests within the same session. As a result, RTSP methods such as SETUP, PLAY, and TEARDOWN can be processed even when the Authorization header contains an empty or invalid response value, as long as the nonce and session identifier correspond to a previously authenticated session. This allows an attacker with network access to reuse session parameters and issue unauthorized RTSP control commands without computing a valid Digest response.
History

Tue, 05 May 2026 13:45:00 +0000

Type Values Removed Values Added
First Time appeared Mercurycom
Mercurycom mipc252w
Mercurycom mipc252w Firmware
CPEs cpe:2.3:h:mercurycom:mipc252w:-:*:*:*:*:*:*:*
cpe:2.3:o:mercurycom:mipc252w_firmware:1.0.5:build_230306:*:*:*:*:*:*
Vendors & Products Mercurycom
Mercurycom mipc252w
Mercurycom mipc252w Firmware

Wed, 29 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Title Unauthorized RTSP Control via Improper Authentication in MERCURY MIPC252W

Tue, 28 Apr 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 28 Apr 2026 16:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Tue, 28 Apr 2026 13:45:00 +0000

Type Values Removed Values Added
Title Unauthorized RTSP Control via Improper Authentication in MERCURY MIPC252W
Weaknesses CWE-287

Tue, 28 Apr 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Mercury
Mercury mipc252w
Vendors & Products Mercury
Mercury mipc252w

Mon, 27 Apr 2026 18:45:00 +0000

Type Values Removed Values Added
Description MERCURY MIPC252W IP camera 1.0.5 Build 230306 Rel.79931n contains an improper authentication vulnerability in the RTSP service. After successful Digest authentication in an initial DESCRIBE request, the device does not verify the Digest response parameter in subsequent RTSP requests within the same session. As a result, RTSP methods such as SETUP, PLAY, and TEARDOWN can be processed even when the Authorization header contains an empty or invalid response value, as long as the nonce and session identifier correspond to a previously authenticated session. This allows an attacker with network access to reuse session parameters and issue unauthorized RTSP control commands without computing a valid Digest response.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-04-27T00:00:00.000Z

Updated: 2026-04-28T15:45:37.220Z

Reserved: 2026-04-06T00:00:00.000Z

Link: CVE-2026-35903

cve-icon Vulnrichment

Updated: 2026-04-28T14:55:28.611Z

cve-icon NVD

Status : Analyzed

Published: 2026-04-27T19:16:52.817

Modified: 2026-05-05T13:39:47.200

Link: CVE-2026-35903

cve-icon Redhat

No data.