Fujitsu Limited Real-time Video Transmission Gear "IP series"
A hardcoded credentials vulnerability (CWE-798) in Fujitsu Real-time Video Transmission Gear IP series devices allows an attacker with network access to obtain valid login credentials and authenticate to the device's web interface. Once logged in, an attacker can initialize or reboot the device, terminating video transmission and causing loss of operational visibility. The vulnerability affects multiple IP series models across firmware versions V01L001 and later (specific affected ranges vary by model). High attack complexity suggests exploitation requires specific knowledge of the credential retrieval method or network conditions.
- Network access to the device's web interface (port 80 or 443 likely)
- Valid login credentials for the web interface
- High attack complexity suggests specific knowledge or conditions required for exploitation
Patching may require device reboot — plan for process interruption
/api/v1/advisories/98e45b8b-fe96-43e8-b345-b4bcde712a3aGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.