The Blackmagic ATEM Mini Pro 2.7 exposes an undocumented Telnet service on TCP port 9993, which accepts unauthenticated plaintext commands for controlling streaming, recording, formatting storage devices, and system reboot. This interface, referred to as the "ATEM Ethernet Protocol 1.0", provides complete device control without requiring credentials or encryption. An attacker on the same network (or with remote access to the exposed port) can exploit this interface to execute arbitrary streaming commands, erase disks, or shut down the device - effectively gaining full remote control.
References
Configurations
No configuration.
History
28 Oct 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-400 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
22 Sep 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-09-22 18:15
Updated : 2025-10-28 21:15
NVD link : CVE-2025-57440
Mitre link : CVE-2025-57440
CVE.ORG link : CVE-2025-57440
JSON object : View
Products Affected
No product.
CWE
CWE-400
Uncontrolled Resource Consumption
