CVE-2025-39245
📋 TL;DR
A CSV injection vulnerability in HikCentral Master Lite allows attackers to inject executable commands via malicious CSV data. This affects users who import CSV files into vulnerable HikCentral Master Lite versions, potentially leading to command execution.
💻 Affected Systems
- HikCentral Master Lite
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution on the HikCentral server if CSV data is processed with elevated privileges, potentially compromising the entire system.
Likely Case
Local command execution on the server when malicious CSV files are imported by administrators or users with import privileges.
If Mitigated
Limited impact if CSV import functionality is restricted to trusted users and input validation is implemented.
🎯 Exploit Status
Exploitation requires ability to upload/import CSV files; typically requires some level of access to the system's import functionality.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Check Hikvision security advisory for specific patched versions
Vendor Advisory: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-some-hikcentral-products/
Restart Required: Yes
Instructions:
1. Review Hikvision security advisory for affected versions. 2. Download and apply the latest patch from Hikvision. 3. Restart the HikCentral Master Lite service. 4. Verify the patch is applied successfully.
🔧 Temporary Workarounds
Restrict CSV Import Access
allLimit CSV import functionality to trusted administrators only and implement strict user access controls.
Input Validation for CSV Files
allImplement server-side validation to sanitize CSV input and reject files containing formula or command characters.
🧯 If You Can't Patch
- Disable CSV import functionality entirely if not required for operations.
- Implement network segmentation to isolate HikCentral systems from critical infrastructure.
🔍 How to Verify
Check if Vulnerable:
Check HikCentral Master Lite version against the vulnerable versions listed in Hikvision's security advisory.
Check Version:
Check version through HikCentral Master Lite web interface or administration console (specific command varies by deployment).
Verify Fix Applied:
Verify the installed version matches or exceeds the patched version specified by Hikvision.
📡 Detection & Monitoring
Log Indicators:
- Unusual CSV import activities
- Failed import attempts with malformed data
- System command execution logs from CSV processing
Network Indicators:
- CSV file uploads to HikCentral web interfaces
- Unexpected outbound connections from HikCentral server post-CSV import
SIEM Query:
source="hikcentral" AND (event="csv_import" OR event="file_upload") AND (data CONTAINS "=\" OR data CONTAINS "+" OR data CONTAINS "-" OR data CONTAINS "@")