CVE-2024-47485
📋 TL;DR
A CSV injection vulnerability in HikCentral Master Lite allows attackers to embed executable commands in CSV files. When users open these malicious files, commands could execute on their systems. This affects organizations using vulnerable HikCentral Master Lite versions.
💻 Affected Systems
- HikCentral Master Lite
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to full system compromise, data theft, or ransomware deployment
Likely Case
Local code execution on user workstations when opening malicious CSV files, potentially leading to lateral movement
If Mitigated
Limited impact if proper file validation and user awareness prevent malicious file execution
🎯 Exploit Status
Exploitation requires social engineering to get users to open malicious CSV files; no authentication bypass needed once file is opened
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check vendor advisory for specific patched versions
Vendor Advisory: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/
Restart Required: Yes
Instructions:
1. Review vendor advisory for affected versions. 2. Download and install the latest patched version from Hikvision. 3. Restart the HikCentral Master Lite service. 4. Verify the update was successful.
🔧 Temporary Workarounds
Disable CSV Import/Export
windowsTemporarily disable CSV import/export functionality if not required
Configuration dependent - disable via application settings or restrict file permissions
User Awareness Training
allTrain users not to open CSV files from untrusted sources
🧯 If You Can't Patch
- Implement application whitelisting to prevent execution of unauthorized commands
- Use network segmentation to isolate HikCentral systems from critical assets
🔍 How to Verify
Check if Vulnerable:
Check HikCentral Master Lite version against vendor advisory; test CSV import with safe test payloads
Check Version:
Check version in HikCentral Master Lite application interface or installation directory
Verify Fix Applied:
Verify installed version matches patched version from vendor advisory; test CSV import functionality
📡 Detection & Monitoring
Log Indicators:
- Unusual CSV file imports
- Suspicious command execution events in system logs
Network Indicators:
- Unexpected outbound connections from HikCentral systems
SIEM Query:
source="HikCentral" AND (event="CSV_import" OR event="file_upload") AND suspicious_patterns