CVE-2025-66174

6.5 MEDIUM

📋 TL;DR

An improper authentication vulnerability in Hikvision DVR/NVR devices allows attackers with physical access to the serial port to execute unauthorized commands. This affects organizations using vulnerable Hikvision surveillance systems, potentially enabling privilege escalation.

💻 Affected Systems

Products:
  • Hikvision DVR/NVR devices
Versions: Specific versions not detailed in advisory; check vendor advisory for exact affected models
Operating Systems: Embedded Linux-based firmware
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with accessible serial ports; requires physical device access

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise allowing attacker to disable security systems, access video feeds, modify configurations, or install persistent malware.

🟠

Likely Case

Unauthorized configuration changes, surveillance system disruption, or data exfiltration from connected cameras.

🟢

If Mitigated

Limited impact due to physical access controls preventing unauthorized serial port access.

🌐 Internet-Facing: LOW - Requires physical access to serial port, not network exploitable.
🏢 Internal Only: MEDIUM - Physical access to devices in server rooms or surveillance areas could be exploited.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires physical serial port access and knowledge of specific command sequences

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check vendor advisory for specific firmware versions

Vendor Advisory: https://www.hikvision.com/en/support/cybersecurity/security-advisory/serial-port-privilege-escalation-vulnerabilities-in-some-hikvision-nvr-devices/

Restart Required: Yes

Instructions:

1. Identify affected device models from vendor advisory. 2. Download latest firmware from Hikvision support portal. 3. Upload firmware via web interface or local update. 4. Reboot device after installation.

🔧 Temporary Workarounds

Physical Serial Port Protection

all

Physically secure serial ports to prevent unauthorized access

Device Physical Security

all

Place devices in locked cabinets or secure rooms with access controls

🧯 If You Can't Patch

  • Implement strict physical access controls to device locations
  • Disable or physically block serial ports using epoxy or port blockers

🔍 How to Verify

Check if Vulnerable:

Check device model against vendor advisory list; devices with accessible serial ports are potentially vulnerable

Check Version:

Check via web interface: System > Maintenance > Version Information

Verify Fix Applied:

Verify firmware version matches patched version from vendor advisory

📡 Detection & Monitoring

Log Indicators:

  • Serial port access logs if available
  • Unexpected configuration changes
  • Unusual reboot events

Network Indicators:

  • None - physical access required

SIEM Query:

Not applicable - physical access vulnerability

🔗 References

📤 Share & Export