Security Vulnerabilities in HikCentral Professional

Security Vulnerabilities in HikCentral Professional

SN No. HSRC-202403-01

 

Edit: Hikvision Security Response Center (HSRC)

 

Initial Release Date: 2024-03-01

 

Summary

(1) Due to insufficient server-side validation, a successful exploit of this vulnerability could allow an attacker to gain access to certain URLs that the attacker should not have access to.

(2) Due to insufficient server-side validation, an attacker with login privileges could access certain resources that the attacker should not have access to by changing parameter values.

 

CVE ID

CVE-2024-25063

CVE-2024-25064

 

Scoring

CVSS v3.1 is adopted in scoring these vulnerabilities (http://www.first.org/cvss/specification-document)

CVE-2024-25063

Base score:7.5 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N)

CVE-2024-25064

Base score:4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N)

Affected Versions and Fix

 

Product Name

CVE ID

Affected Versions

HikCentral Professional

CVE-2024-25063

Versions below V2.5.1 (including V2.5.1)

HikCentral Professional

CVE-2024-25064

Versions after V2.0.0 and before V2.5.1

Obtaining Fixed Version

Contact the local technical support team (click to select a country or region and check the detail technical service) to get the support.

 

Source of vulnerability information

These vulnerabilities were reported to HSRC by Michael Dubell and Abdulazeez Omar.

 

Contact Us

To report any security issues or vulnerabilities in Hikvision products and solutions, please contact Hikvision Security Response Center at hsrc@hikvision.com.

 

Hikvision would like to thank all security researchers for your attention to our products.

Hikvision.com은 웹사이트 작동을 위해 필수 쿠키 및 관련 기술을 사용합니다. 귀하의 동의 하에, 당사는 트래픽 수준 및 기타 지표를 관찰 및 분석하고, 타겟 광고를 표시하고, 귀하의 위치를 기반으로 광고를 표시하고, 웹사이트 콘텐츠를 맞춤화하기 위해 쿠키를 사용합니다. 쿠키 사용 방식에 대한 자세한 내용은 cookie policy를 참조하십시오.

문의하기
Hik-Partner Pro
Hik-Partner Pro

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.