CVE-2023-53691: CWE-24 Path Traversal: '../filedir' in Hikvision CSMP iSecure Center
Hikvision CSMP (Comprehensive Security Management Platform) iSecure Center through 2023-06-25 allows file upload via /center/api/files directory traversal, as exploited in the wild in 2024 and 2025.
AI Analysis
Technical Summary
CVE-2023-53691 is a path traversal vulnerability classified under CWE-24 affecting Hikvision's Comprehensive Security Management Platform (CSMP) iSecure Center. The flaw exists in the file upload functionality accessible via the /center/api/files endpoint, allowing attackers to traverse directories using '../filedir' sequences. This enables unauthorized file uploads outside the intended directory, potentially overwriting critical files or placing malicious payloads on the server. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 8.3 indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable scope, impacting confidentiality, integrity, and availability to some extent. Although no public exploits have been confirmed in the wild as of the latest data, the vulnerability was reportedly exploited in 2024 and 2025, indicating active threat actor interest. The lack of available patches at the time of reporting necessitates immediate compensating controls. The vulnerability could allow attackers to execute arbitrary code, disrupt services, or gain further access within affected environments, especially critical given Hikvision's widespread use in security and surveillance systems.
Potential Impact
For European organizations, the impact of CVE-2023-53691 is significant due to Hikvision's extensive deployment in security management and surveillance infrastructure. Successful exploitation can lead to unauthorized file uploads, enabling attackers to implant malware, disrupt monitoring services, or escalate privileges within the network. This compromises the confidentiality of sensitive surveillance data, the integrity of security configurations, and the availability of critical monitoring systems. Sectors such as government, transportation, energy, and large enterprises relying on Hikvision CSMP iSecure Center for centralized security management are particularly vulnerable. The potential for remote exploitation without authentication increases the risk of widespread attacks, including ransomware or espionage campaigns. Disruption of security monitoring can have cascading effects on physical security and incident response capabilities, elevating the threat to public safety and organizational resilience.
Mitigation Recommendations
1. Immediately restrict network access to the CSMP iSecure Center management interface, limiting it to trusted internal networks and VPN connections only. 2. Monitor and analyze logs for suspicious file upload attempts or directory traversal patterns targeting /center/api/files. 3. Implement web application firewalls (WAF) with custom rules to detect and block path traversal payloads and unauthorized file uploads. 4. Apply strict input validation and sanitization on file upload parameters to prevent directory traversal sequences. 5. Coordinate with Hikvision for timely patch deployment once available; prioritize testing and applying updates in all affected environments. 6. Conduct thorough security audits of CSMP iSecure Center deployments to identify unauthorized changes or implanted files. 7. Employ network segmentation to isolate security management platforms from general IT infrastructure, reducing lateral movement risk. 8. Educate security teams about this vulnerability to enhance detection and incident response readiness. 9. Consider alternative or additional security management solutions if patching is delayed or unsupported.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2023-53691: CWE-24 Path Traversal: '../filedir' in Hikvision CSMP iSecure Center
Description
Hikvision CSMP (Comprehensive Security Management Platform) iSecure Center through 2023-06-25 allows file upload via /center/api/files directory traversal, as exploited in the wild in 2024 and 2025.
AI-Powered Analysis
Technical Analysis
CVE-2023-53691 is a path traversal vulnerability classified under CWE-24 affecting Hikvision's Comprehensive Security Management Platform (CSMP) iSecure Center. The flaw exists in the file upload functionality accessible via the /center/api/files endpoint, allowing attackers to traverse directories using '../filedir' sequences. This enables unauthorized file uploads outside the intended directory, potentially overwriting critical files or placing malicious payloads on the server. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. The CVSS 3.1 base score of 8.3 indicates a high-severity issue with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is changed (S:C), meaning the vulnerability affects components beyond the initially vulnerable scope, impacting confidentiality, integrity, and availability to some extent. Although no public exploits have been confirmed in the wild as of the latest data, the vulnerability was reportedly exploited in 2024 and 2025, indicating active threat actor interest. The lack of available patches at the time of reporting necessitates immediate compensating controls. The vulnerability could allow attackers to execute arbitrary code, disrupt services, or gain further access within affected environments, especially critical given Hikvision's widespread use in security and surveillance systems.
Potential Impact
For European organizations, the impact of CVE-2023-53691 is significant due to Hikvision's extensive deployment in security management and surveillance infrastructure. Successful exploitation can lead to unauthorized file uploads, enabling attackers to implant malware, disrupt monitoring services, or escalate privileges within the network. This compromises the confidentiality of sensitive surveillance data, the integrity of security configurations, and the availability of critical monitoring systems. Sectors such as government, transportation, energy, and large enterprises relying on Hikvision CSMP iSecure Center for centralized security management are particularly vulnerable. The potential for remote exploitation without authentication increases the risk of widespread attacks, including ransomware or espionage campaigns. Disruption of security monitoring can have cascading effects on physical security and incident response capabilities, elevating the threat to public safety and organizational resilience.
Mitigation Recommendations
1. Immediately restrict network access to the CSMP iSecure Center management interface, limiting it to trusted internal networks and VPN connections only. 2. Monitor and analyze logs for suspicious file upload attempts or directory traversal patterns targeting /center/api/files. 3. Implement web application firewalls (WAF) with custom rules to detect and block path traversal payloads and unauthorized file uploads. 4. Apply strict input validation and sanitization on file upload parameters to prevent directory traversal sequences. 5. Coordinate with Hikvision for timely patch deployment once available; prioritize testing and applying updates in all affected environments. 6. Conduct thorough security audits of CSMP iSecure Center deployments to identify unauthorized changes or implanted files. 7. Employ network segmentation to isolate security management platforms from general IT infrastructure, reducing lateral movement risk. 8. Educate security teams about this vulnerability to enhance detection and incident response readiness. 9. Consider alternative or additional security management solutions if patching is delayed or unsupported.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-10-22T00:00:00.000Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68f856df8c4621f9a336a1f7
Added to database: 10/22/2025, 4:00:31 AM
Last enriched: 10/29/2025, 4:42:23 AM
Last updated: 12/7/2025, 2:38:03 PM
Views: 73
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14194: Cross Site Scripting in code-projects Employee Profile Management System
MediumCVE-2025-14192: SQL Injection in RashminDungrani online-banking
MediumCVE-2025-14193: SQL Injection in code-projects Employee Profile Management System
MediumCVE-2025-14191: Buffer Overflow in UTT 进取 512W
HighCVE-2025-14190: SQL Injection in Chanjet TPlus
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.