Critical Vulnerability in Pelco Sarix Pro 3 IP Cameras Exposes Surveillance Systems

A critical authentication bypass vulnerability (CVE-2026-1241) in **Pelco Sarix Pro 3 Series IP cameras** allows attackers to gain unauthorized access to live video feeds and sensitive device data. Affecting multiple models running firmware **≤02.52**, this flaw poses significant privacy, operational, and compliance risks. Users are urged to update to firmware **02.53 or later** immediately to mitigate threats.

---
title: "Critical Vulnerability in Pelco Sarix Pro 3 IP Cameras Exposes Surveillance Systems"
short_title: "Pelco Sarix Pro 3 cameras at risk of unauthorized access"
description: "A high-severity authentication bypass flaw (CVE-2026-1241) in Pelco Sarix Pro 3 IP cameras threatens global surveillance systems. Learn how to mitigate risks now."
author: "Vitus"
date: 2024-10-02
categories: [Cybersecurity, Vulnerabilities]
tags: [pelco, cve-2026-1241, ip-cameras, authentication-bypass, surveillance-security]
score: 0.78
cve_ids: [CVE-2026-1241]
---

TL;DR


A critical authentication bypass vulnerability (CVE-2026-1241) in Pelco Sarix Pro 3 Series IP cameras allows attackers to gain unauthorized access to live video feeds and sensitive device data. Affecting multiple models running firmware ≤02.52, this flaw poses significant privacy, operational, and compliance risks. Users are urged to update to firmware 02.53 or later immediately to mitigate threats.

---

Main Content

Introduction


Surveillance systems are the backbone of security for critical infrastructure sectors worldwide. However, a newly disclosed high-severity vulnerability in Pelco Sarix Pro 3 Series IP cameras threatens to undermine their integrity. Identified as CVE-2026-1241, this flaw enables attackers to bypass authentication mechanisms, exposing live video streams and sensitive data. With deployments spanning commercial facilities, healthcare, energy, and government sectors, the implications of this vulnerability are far-reaching.

---

Key Points


- Vulnerability: Authentication bypass flaw (CVE-2026-1241) in Pelco Sarix Pro 3 Series IP cameras.
- Affected Models: Sarix Professional IMP, IXP, IBP, and IWP 3 Series running firmware ≤02.52.
- Severity: Rated 7.5 (High) on the CVSS scale, with potential for privacy breaches and operational disruptions.
- Impact: Unauthorized access to live video feeds, regulatory compliance risks, and exposure to cyber-physical threats.
- Mitigation: Update to firmware 02.53 or later via Pelco’s [official support page](https://www.pelco.com/support).

---

Technical Details


The vulnerability stems from inadequate access control enforcement in the web management interface of Pelco Sarix Pro 3 Series cameras. Attackers can exploit this flaw to bypass authentication and access critical functionality, including:
- Live video streams: Unauthorized viewing of surveillance footage.
- Device configurations: Potential manipulation of camera settings.
- Sensitive data: Exposure of operational and privacy-related information.

The flaw is classified under CWE-288 (Authentication Bypass Using an Alternate Path or Channel) and has a CVSS v3.1 base score of 7.5, reflecting its high severity. The vector string CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N indicates that exploitation is possible remotely without user interaction.

---

Impact Assessment


#### Sectors at Risk
Pelco Sarix Pro 3 cameras are deployed across critical infrastructure sectors, including:
- Commercial Facilities: Retail, offices, and public spaces.
- Defense Industrial Base: Military and defense contractors.
- Energy: Power plants and utilities.
- Government Services: Public safety and administrative facilities.
- Healthcare: Hospitals and medical centers.
- Transportation Systems: Airports, railways, and ports.

#### Potential Consequences
- Privacy Violations: Unauthorized access to surveillance footage can lead to data breaches and regulatory penalties.
- Operational Disruptions: Attackers could disable or manipulate cameras, compromising physical security.
- Compliance Risks: Non-compliance with GDPR, HIPAA, and other regulations due to inadequate security controls.
- Reputational Damage: Loss of trust among stakeholders and customers.

---

Mitigation Steps


Pelco has released a firmware update (02.53) to address this vulnerability. Users are advised to:
1. Update Immediately: Install firmware 02.53 or later on all affected cameras.
2. Restrict Network Access: Isolate cameras from publicly accessible networks and place them behind firewalls.
3. Use Secure Remote Access: Employ VPNs for remote access and ensure they are updated to the latest version.
4. Monitor for Suspicious Activity: Implement intrusion detection systems (IDS) to identify unauthorized access attempts.
5. Follow CISA Guidelines: Adhere to CISA’s recommended practices for securing industrial control systems (ICS). More details are available on the [CISA ICS webpage](https://www.cisa.gov/ics).

---

Affected Systems


The following Pelco Sarix Pro 3 Series models are affected if running firmware ≤02.52:
- Sarix Professional IMP 3 Series
- Sarix Professional IXP 3 Series
- Sarix Professional IBP 3 Series
- Sarix Professional IWP 3 Series

---

Conclusion


The CVE-2026-1241 vulnerability in Pelco Sarix Pro 3 IP cameras highlights the critical importance of securing surveillance systems against cyber threats. Organizations must act swiftly to update firmware, restrict network access, and implement robust security measures to mitigate risks. Failure to address this flaw could result in severe privacy breaches, operational disruptions, and regulatory penalties.

For further guidance, visit Pelco’s [support page](https://www.pelco.com/support) or refer to CISA’s ICS advisory for best practices in securing critical infrastructure.

---

References


[^1]: CISA. "[ICSA-26-057-02 Pelco, Inc. Sarix Pro 3 Series IP Cameras](https://www.cisa.gov/news-events/ics-advisories/icsa-26-057-02)". Retrieved 2024-10-02.
[^2]: NIST. "[CVE-2026-1241 Detail](https://nvd.nist.gov/vuln/detail/CVE-2026-1241)". Retrieved 2024-10-02.
[^3]: MITRE. "[CWE-288: Authentication Bypass Using an Alternate Path or Channel](https://cwe.mitre.org/data/definitions/288.html)". Retrieved 2024-10-02.

Related CVEs