Published:2025/03/25  Last Updated:2025/03/26

JVNVU#91154745
Multiple vulnerabilities in CHOCO TEI WATCHER mini

Overview

CHOCO TEI WATCHER mini provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities.

Products Affected

  • CHOCO TEI WATCHER mini (IB-MCT001) all versions

Description

CHOCO TEI WATCHER mini provided by Inaba Denki Sangyo Co., Ltd. contains multiple vulnerabilities listed below.

  • Use of client-side authentication (CWE-603)
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score 7.5
    • CVE-2025-24517
  • Storing passwords in a recoverable format (CWE-257)
    • CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N Base Score 4.6
    • CVE-2025-24852
  • Weak password requirements (CWE-521)
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
    • CVE-2025-25211
  • Forced browsing (CWE-425)
    • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Base Score 9.8
    • CVE-2025-26689

Impact

  • A remote attacker may obtain the product's login password without authentication (CVE-2025-24517)
  • An attacker who can access the microSD card used on the product may obtain the product's login password (CVE-2025-24852)
  • Brute-force attack may allow an attacker unauthorized access and login (CVE-2025-25211)
  • If a remote attacker sends a specially crafted HTTP request to the product, the product's data may be obtained or deleted, and/or the product's settings may be altered (CVE-2025-26689)

Solution

Apply the Workaround
The following workaround may mitigate the impacts of these vulnerabilities.

  • Use the product within LAN and block access from untrusted networks and hosts through firewalls
  • Use a firewall or virtual private network (VPN), etc. to prevent unauthorized access when internet access is required, and restrict internet access to minimum
  • Restrict the product operation (including use/handling of microSD cards on the product) only to authorized users
For more details, refer to the information provided by the developer.

Vendor Status

References

  1. ICS Advisory | ICSA-25-084-04
    Inaba Denki Sangyo CHOCO TEI WATCHER mini
  2. Nozomi Networks
    Unpatched Vulnerabilities in Production Line Cameras May Allow Remote Surveillance, Hinder Stoppage Recording

JPCERT/CC Addendum

Vulnerability Analysis by JPCERT/CC

Credit

Andrea Palanca of Nozomi Networks reported these vulnerabilities to the developer and CISA ICS.
JPCERT/CC coordinated with the reporter, CISA ICS, and the developer.

Other Information

JPCERT Alert
JPCERT Reports
CERT Advisory
CPNI Advisory
TRnotes
CVE CVE-2025-24517
CVE-2025-24852
CVE-2025-25211
CVE-2025-26689
JVN iPedia

Update History

2025/03/26
Information under the section [References] was updated