Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2023-53691: CWE-24 Path Traversal: '../filedir' in Hikvision CSMP iSecure Center

0
High
VulnerabilityCVE-2023-53691cvecve-2023-53691cwe-24
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Hikvision
Product: CSMP iSecure Center

Description

Hikvision CSMP (Comprehensive Security Management Platform) iSecure Center through 2023-06-25 allows file upload via /center/api/files directory traversal, as exploited in the wild in 2024 and 2025.

AI-Powered Analysis

AILast updated: 10/22/2025, 04:01:00 UTC

Technical Analysis

CVE-2023-53691 is a path traversal vulnerability classified under CWE-24 affecting Hikvision's CSMP iSecure Center, a comprehensive security management platform. The vulnerability exists in the file upload functionality exposed at the /center/api/files endpoint, where insufficient validation of file paths allows attackers to use directory traversal sequences (e.g., '../filedir') to escape the intended upload directory. This flaw permits remote, unauthenticated attackers to upload arbitrary files to arbitrary locations on the server's filesystem. The consequences include potential unauthorized access to sensitive files, modification or replacement of critical application files, and the possibility of executing malicious code if uploaded files are executed by the system. The vulnerability has a CVSS 3.1 base score of 8.3, indicating high severity due to network attack vector, no required privileges or user interaction, and a scope change affecting confidentiality, integrity, and availability. Although no official patches or exploit code links are currently provided, the vulnerability has been reportedly exploited in the wild during 2024 and 2025, underscoring its real-world risk. The affected product is widely used in security monitoring and management, making this vulnerability particularly impactful for organizations relying on Hikvision's platform for surveillance and security operations.

Potential Impact

For European organizations, the impact of CVE-2023-53691 can be severe. The ability to upload arbitrary files without authentication can lead to unauthorized disclosure of sensitive information, tampering with security configurations, and potential full system compromise if attackers upload and execute malicious payloads. This risk is amplified in critical infrastructure sectors such as transportation, energy, and public safety, where Hikvision products are often deployed for surveillance and security management. Disruption or compromise of these systems could lead to operational downtime, data breaches, and erosion of trust in security services. Additionally, regulatory compliance risks arise under GDPR and other data protection laws if personal or sensitive data is exposed or manipulated. The vulnerability’s network-exploitable nature means attackers can launch attacks remotely, increasing the threat landscape for organizations with internet-facing or poorly segmented internal networks.

Mitigation Recommendations

Organizations should prioritize the following mitigations: 1) Apply vendor-supplied patches immediately once available to fix the path traversal validation flaw. 2) Until patches are deployed, restrict access to the /center/api/files endpoint using network segmentation, firewalls, and access control lists to limit exposure to trusted internal IPs only. 3) Implement strict input validation and monitoring on file upload endpoints to detect and block directory traversal patterns. 4) Conduct regular security audits and file integrity monitoring on servers running CSMP iSecure Center to detect unauthorized file changes. 5) Employ intrusion detection/prevention systems (IDS/IPS) with signatures tuned to detect exploitation attempts targeting this vulnerability. 6) Educate security teams to recognize indicators of compromise related to arbitrary file uploads and to respond swiftly to suspicious activity. 7) Review and harden server permissions to minimize the impact of any successful file upload, ensuring that uploaded files cannot be executed or accessed by unauthorized processes.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f856df8c4621f9a336a1f7

Added to database: 10/22/2025, 4:00:31 AM

Last enriched: 10/22/2025, 4:01:00 AM

Last updated: 10/23/2025, 6:01:09 PM

Views: 17

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats