An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system.
Metrics
Affected Vendors & Products
References
History
Wed, 02 Jul 2025 21:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 02 Jul 2025 14:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. | |
Title | Hikvision HikCentral (formerly "Integrated Security Management Platform") Remote Command Execution via applyCT Fastjson | |
Weaknesses | CWE-502 CWE-917 |
|
References |
|
|
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-02T13:44:21.664Z
Updated: 2025-07-02T20:25:16.191Z
Reserved: 2025-04-15T19:15:22.549Z
Link: CVE-2025-34067

Updated: 2025-07-02T20:25:11.993Z

Status : Awaiting Analysis
Published: 2025-07-02T14:15:24.250
Modified: 2025-07-03T15:13:53.147
Link: CVE-2025-34067

No data.