MERCURY MIPC252W IP camera 1.0.5 Build 230306 Rel.79931n contains an improper authentication vulnerability in the RTSP service. After successful Digest authentication in an initial DESCRIBE request, the device does not verify the Digest response parameter in subsequent RTSP requests within the same session. As a result, RTSP methods such as SETUP, PLAY, and TEARDOWN can be processed even when the Authorization header contains an empty or invalid response value, as long as the nonce and session identifier correspond to a previously authenticated session. This allows an attacker with network access to reuse session parameters and issue unauthorized RTSP control commands without computing a valid Digest response.
Metrics
Affected Vendors & Products
References
History
Tue, 05 May 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mercurycom
Mercurycom mipc252w Mercurycom mipc252w Firmware |
|
| CPEs | cpe:2.3:h:mercurycom:mipc252w:-:*:*:*:*:*:*:* cpe:2.3:o:mercurycom:mipc252w_firmware:1.0.5:build_230306:*:*:*:*:*:* |
|
| Vendors & Products |
Mercurycom
Mercurycom mipc252w Mercurycom mipc252w Firmware |
Wed, 29 Apr 2026 00:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized RTSP Control via Improper Authentication in MERCURY MIPC252W |
Tue, 28 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 28 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Tue, 28 Apr 2026 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Unauthorized RTSP Control via Improper Authentication in MERCURY MIPC252W | |
| Weaknesses | CWE-287 |
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Mercury
Mercury mipc252w |
|
| Vendors & Products |
Mercury
Mercury mipc252w |
Mon, 27 Apr 2026 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | MERCURY MIPC252W IP camera 1.0.5 Build 230306 Rel.79931n contains an improper authentication vulnerability in the RTSP service. After successful Digest authentication in an initial DESCRIBE request, the device does not verify the Digest response parameter in subsequent RTSP requests within the same session. As a result, RTSP methods such as SETUP, PLAY, and TEARDOWN can be processed even when the Authorization header contains an empty or invalid response value, as long as the nonce and session identifier correspond to a previously authenticated session. This allows an attacker with network access to reuse session parameters and issue unauthorized RTSP control commands without computing a valid Digest response. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-04-27T00:00:00.000Z
Updated: 2026-04-28T15:45:37.220Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-35903
Updated: 2026-04-28T14:55:28.611Z
Status : Analyzed
Published: 2026-04-27T19:16:52.817
Modified: 2026-05-05T13:39:47.200
Link: CVE-2026-35903
No data.