CVE-2025-39245

4.7 MEDIUM

📋 TL;DR

A CSV injection vulnerability in HikCentral Master Lite allows attackers to inject executable commands via malicious CSV data. This affects users who import CSV files into vulnerable HikCentral Master Lite versions, potentially leading to command execution.

💻 Affected Systems

Products:
  • HikCentral Master Lite
Versions: Specific vulnerable versions not detailed in advisory; check Hikvision security advisory for exact versions.
Operating Systems: Windows Server (typical for HikCentral deployments)
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability exists in CSV import functionality; systems using CSV data import are at risk.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution on the HikCentral server if CSV data is processed with elevated privileges, potentially compromising the entire system.

🟠

Likely Case

Local command execution on the server when malicious CSV files are imported by administrators or users with import privileges.

🟢

If Mitigated

Limited impact if CSV import functionality is restricted to trusted users and input validation is implemented.

🌐 Internet-Facing: MEDIUM - Exploitation requires CSV file upload/import capability, which may be exposed via web interfaces.
🏢 Internal Only: MEDIUM - Internal users with CSV import privileges could exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires ability to upload/import CSV files; typically requires some level of access to the system's import functionality.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check Hikvision security advisory for specific patched versions

Vendor Advisory: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-vulnerabilities-in-some-hikcentral-products/

Restart Required: Yes

Instructions:

1. Review Hikvision security advisory for affected versions. 2. Download and apply the latest patch from Hikvision. 3. Restart the HikCentral Master Lite service. 4. Verify the patch is applied successfully.

🔧 Temporary Workarounds

Restrict CSV Import Access

all

Limit CSV import functionality to trusted administrators only and implement strict user access controls.

Input Validation for CSV Files

all

Implement server-side validation to sanitize CSV input and reject files containing formula or command characters.

🧯 If You Can't Patch

  • Disable CSV import functionality entirely if not required for operations.
  • Implement network segmentation to isolate HikCentral systems from critical infrastructure.

🔍 How to Verify

Check if Vulnerable:

Check HikCentral Master Lite version against the vulnerable versions listed in Hikvision's security advisory.

Check Version:

Check version through HikCentral Master Lite web interface or administration console (specific command varies by deployment).

Verify Fix Applied:

Verify the installed version matches or exceeds the patched version specified by Hikvision.

📡 Detection & Monitoring

Log Indicators:

  • Unusual CSV import activities
  • Failed import attempts with malformed data
  • System command execution logs from CSV processing

Network Indicators:

  • CSV file uploads to HikCentral web interfaces
  • Unexpected outbound connections from HikCentral server post-CSV import

SIEM Query:

source="hikcentral" AND (event="csv_import" OR event="file_upload") AND (data CONTAINS "=\" OR data CONTAINS "+" OR data CONTAINS "-" OR data CONTAINS "@")

🔗 References

📤 Share & Export