LG Innotek Camera Multiple Models

Plan PatchCVSS 8.6ICS-CERT ICSA-25-273-07Sep 30, 2025
Attack path
Attack VectorNetwork
Auth RequiredNone
ComplexityLow
User InteractionNone needed
Summary

The LG LNV7210R and LND7210 cameras contain an authentication bypass vulnerability (CWE-288) that allows an attacker on the network to gain administrative access without valid credentials. LG Innotek has designated both models as end-of-life and will not release patches. Successful exploitation grants full administrative control of the camera, including the ability to access video feeds, modify settings, or use the device as a network pivot point.

What this means
What could happen
An attacker with network access to an LG Innotek camera could gain full administrative control of the device. This could allow unauthorized video access, device manipulation, or use of the camera as a pivot point into your network.
Who's at risk
Organizations using LG Innotek LNV7210R or LND7210 cameras for facility monitoring, surveillance, or integration with building management systems. This includes water utilities, electric utilities, and other critical infrastructure operators who rely on CCTV for physical security and operational awareness.
How it could be exploited
An attacker on the network sends a request to the camera without needing valid credentials (the vulnerability bypasses authentication). The attacker then authenticates as an administrator and gains control of the device.
Prerequisites
  • Network reachability to the camera (direct or via same subnet)
  • Camera must be on a network accessible from the attacker
remotely exploitableno authentication requiredlow complexityno patch available (end-of-life product)high CVSS score (8.6)
Exploitability
Unlikely to be exploited — EPSS score 0.1%
Affected products (2)
2 EOL
ProductAffected VersionsFix Status
LG LNV7210R: vers:all/*All versionsNo fix (EOL)
LG LND7210: vers:all/*All versionsNo fix (EOL)
Remediation & Mitigation
0/5
Do now
0/2
HARDENINGRestrict network access to LG LNV7210R and LND7210 cameras using firewall rules—only allow traffic from authorized management workstations or control room subnets
HARDENINGIsolate camera networks from direct Internet connectivity; ensure cameras are not reachable from external networks or business office networks
Schedule — requires maintenance window
0/2

Patching may require device reboot — plan for process interruption

WORKAROUNDIf remote management access is needed, require VPN with strong authentication and restrict VPN access to specific administrative users
HARDENINGMonitor network traffic to these cameras for suspicious administrative login attempts or configuration changes
Mitigations - no patch available
0/1
The following products have reached End of Life with no planned fix: LG LNV7210R: vers:all/*, LG LND7210: vers:all/*. Apply the following compensating controls:
HARDENINGConduct a network inventory to identify all LG LNV7210R and LND7210 cameras in use; develop a timeline to replace end-of-life units with current supported models
API: /api/v1/advisories/0fbacb33-2548-4314-86b1-2debcce78b9c

Get OT security insights every Tuesday

Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.

LG Innotek Camera Multiple Models | CVSS 8.6 - OTPulse