Cognex In-Sight Explorer and In-Sight Camera Firmware
Multiple vulnerabilities in Cognex In-Sight Explorer software and In-Sight camera firmware versions 5.x through 6.5.1 allow authenticated attackers to disclose sensitive information, steal credentials, modify files, or cause denial-of-service. Vulnerabilities include hardcoded credentials (CWE-259), cleartext credential transmission (CWE-319), insecure file permissions (CWE-276 and CWE-732), weak credential validation (CWE-307 and CWE-294), and insecure protocol configuration (CWE-602). These issues could allow an attacker with network access and valid credentials to execute arbitrary commands or firmware modifications on affected systems.
- Network access to the In-Sight camera or Explorer software port (typically HTTP/HTTPS or proprietary vision system management protocols)
- Valid user credentials for the target In-Sight system
- Product firmware version 5.x through 6.5.1
Patching may require device reboot — plan for process interruption
/api/v1/advisories/92928986-7f49-44f3-b14c-101be407ef9fGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.