Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-28814: Vulnerability in Hikvision iSecure Center

0
Critical
VulnerabilityCVE-2023-28814cvecve-2023-28814
Published: Fri Oct 17 2025 (10/17/2025, 11:07:06 UTC)
Source: CVE Database V5
Vendor/Project: Hikvision
Product: iSecure Center

Description

Some versions of Hikvision's iSecure Center Product have an improper file upload control vulnerability. Due to the improper verification of file to be uploaded, attackers may upload malicious files to the server. iSecure Center is software released for China's domestic market only, with no overseas release.

AI-Powered Analysis

AILast updated: 10/17/2025, 11:31:45 UTC

Technical Analysis

CVE-2023-28814 is a critical security vulnerability identified in Hikvision's iSecure Center software, versions 1.0.0 through 1.7.0. The vulnerability arises from improper file upload control, where the software fails to adequately verify the legitimacy and safety of files being uploaded to the server. This flaw enables unauthenticated remote attackers to upload arbitrary malicious files, potentially leading to full system compromise. The CVSS 3.1 base score of 9.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with an attack vector of network (AV:N), no required privileges (PR:N), and no user interaction (UI:N). The scope is unchanged (S:U), meaning the vulnerability affects only the vulnerable component. The iSecure Center software is designed exclusively for the Chinese domestic market and is not officially released overseas, which significantly limits the exposure of this vulnerability outside China. No public exploits or active exploitation have been reported to date. The vulnerability could allow attackers to execute arbitrary code, disrupt services, or exfiltrate sensitive data by leveraging the malicious files uploaded to the server. Given the criticality, timely patching and mitigation are essential once patches become available. The lack of patch links suggests that fixes may still be pending or not widely distributed. Organizations using Hikvision products should monitor vendor advisories closely. The vulnerability highlights the risks associated with insecure file upload mechanisms, a common attack vector in web applications and networked software.

Potential Impact

For European organizations, the direct impact of CVE-2023-28814 is currently limited due to the iSecure Center software's exclusive deployment in the Chinese domestic market. However, indirect risks exist if European entities have supply chain dependencies, partnerships, or subsidiaries that utilize this software or if the vulnerability is present in related Hikvision products deployed in Europe. Successful exploitation could lead to unauthorized remote code execution, data breaches, service disruption, and potential lateral movement within affected networks. Given Hikvision's widespread use in physical security and surveillance infrastructure globally, any compromise could have cascading effects on security monitoring and operational technology environments. The critical severity and ease of exploitation without authentication or user interaction underscore the potential for severe consequences if the vulnerability were to appear in European deployments or if attackers leverage it as part of multi-stage attacks targeting European organizations. Additionally, geopolitical tensions and scrutiny around Hikvision products may increase the risk profile for European critical infrastructure and government sectors. Therefore, while the immediate threat is geographically constrained, vigilance and proactive risk management remain important for European stakeholders.

Mitigation Recommendations

1. Monitor Hikvision's official channels for patch releases addressing CVE-2023-28814 and apply updates promptly once available. 2. Restrict network access to iSecure Center servers using firewalls and network segmentation to limit exposure to untrusted networks. 3. Implement strict file upload validation controls at the network perimeter and application level, including file type whitelisting, size limits, and content scanning. 4. Deploy intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous file upload attempts and suspicious network activity targeting Hikvision devices. 5. Conduct regular security audits and vulnerability assessments of Hikvision products within the environment to identify unauthorized changes or suspicious files. 6. Enforce strong access controls and authentication mechanisms around management interfaces to reduce the risk of lateral exploitation. 7. Educate security teams about this vulnerability and incorporate it into incident response plans, emphasizing rapid containment and remediation. 8. For organizations with supply chain exposure, verify the security posture of partners and subsidiaries using Hikvision products and encourage coordinated vulnerability management. 9. Consider network-level application whitelisting or sandboxing for critical systems running Hikvision software to mitigate potential exploitation impact. 10. Maintain comprehensive logging and monitoring to enable forensic analysis in case of suspected compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
hikvision
Date Reserved
2023-03-23T19:49:08.440Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f225aa9c34d0947f17ca54

Added to database: 10/17/2025, 11:16:58 AM

Last enriched: 10/17/2025, 11:31:45 AM

Last updated: 10/19/2025, 2:00:18 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats