CVE-2024-47487

8.8 HIGH

📋 TL;DR

This SQL injection vulnerability in HikCentral Professional allows authenticated users to execute arbitrary SQL queries against the database. This could lead to data theft, manipulation, or system compromise. Organizations using affected HikCentral Professional versions are at risk.

💻 Affected Systems

Products:
  • HikCentral Professional
Versions: Specific versions not detailed in advisory; check Hikvision security advisory for exact affected versions
Operating Systems: Windows Server (typical deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access; vulnerability exists in the application layer regardless of database type.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete database compromise including data exfiltration, data manipulation, privilege escalation, and potential remote code execution on the underlying server.

🟠

Likely Case

Unauthorized data access and extraction of sensitive information from the database, potentially including user credentials, surveillance data, and system configurations.

🟢

If Mitigated

Limited impact due to proper input validation, parameterized queries, and database permissions restricting the authenticated user's access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

SQL injection typically has low exploitation complexity once the vulnerable endpoint is identified; requires authenticated access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Hikvision advisory for specific patched versions

Vendor Advisory: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-hikcentral-product-series/

Restart Required: Yes

Instructions:

1. Review Hikvision security advisory for affected versions. 2. Download and apply the latest patch from Hikvision. 3. Restart the HikCentral Professional service. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to HikCentral Professional to only trusted IP addresses and networks.

Database Permission Reduction

all

Limit database user permissions to only necessary operations (SELECT, INSERT, UPDATE as needed) to reduce impact of successful exploitation.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection rules
  • Monitor database logs for unusual query patterns and implement alerting

🔍 How to Verify

Check if Vulnerable:

Check HikCentral Professional version against the affected versions listed in the Hikvision security advisory.

Check Version:

Check version through HikCentral Professional web interface or consult system documentation

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version specified in the Hikvision advisory.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL query patterns in database logs
  • Multiple failed login attempts followed by complex queries
  • Queries containing SQL injection patterns (UNION, SELECT, etc.)

Network Indicators:

  • Unusual outbound database connections from application server
  • Large data transfers from database to unexpected destinations

SIEM Query:

source="database_logs" AND (query="*UNION*" OR query="*SELECT*FROM*" OR query="*INSERT*INTO*")

🔗 References

📤 Share & Export