Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-58274: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Hikvision CSMP iSecure Center

0
High
VulnerabilityCVE-2024-58274cvecve-2024-58274cwe-78
Published: Wed Oct 22 2025 (10/22/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: Hikvision
Product: CSMP iSecure Center

Description

Hikvision CSMP (Comprehensive Security Management Platform) iSecure Center through 2024-08-01 allows execution of a command within $( ) in /center/api/installation/detection JSON data, as exploited in the wild in 2024 and 2025.

AI-Powered Analysis

AILast updated: 10/22/2025, 04:00:46 UTC

Technical Analysis

CVE-2024-58274 is an OS command injection vulnerability classified under CWE-78, found in Hikvision's CSMP iSecure Center product. The flaw exists in the handling of JSON data submitted to the /center/api/installation/detection endpoint, where user-supplied input within the $( ) syntax is improperly neutralized, allowing execution of arbitrary operating system commands. This vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The vulnerability affects all versions up to the publication date and has a CVSS 3.1 base score of 8.3, reflecting its high severity. The scope is 'changed' indicating that exploitation can affect resources beyond the vulnerable component, potentially compromising the entire system. Successful exploitation can lead to unauthorized disclosure of information, modification of data, and disruption of service. Although no public exploit code has been released yet, reports indicate exploitation attempts in 2024 and 2025, highlighting active threat actor interest. The vulnerability poses a significant risk to organizations relying on Hikvision CSMP iSecure Center for security management, as attackers could leverage this flaw to gain persistent control over security infrastructure components.

Potential Impact

For European organizations, the impact of CVE-2024-58274 is substantial. Hikvision products are widely used in physical security, surveillance, and critical infrastructure management across Europe. Exploitation could lead to unauthorized access to sensitive security management systems, enabling attackers to manipulate surveillance data, disable security controls, or pivot to other internal systems. This compromises confidentiality, integrity, and availability of security operations, potentially causing operational disruptions and data breaches. Critical sectors such as transportation, government facilities, energy, and large enterprises using Hikvision CSMP iSecure Center are particularly vulnerable. The ability to execute OS commands remotely without authentication increases the risk of rapid, automated attacks and lateral movement within networks. This could undermine trust in security infrastructure and lead to regulatory and compliance repercussions under GDPR and other European cybersecurity frameworks.

Mitigation Recommendations

Immediate mitigation steps include: 1) Monitoring Hikvision’s official channels for patches or updates addressing CVE-2024-58274 and applying them promptly once available. 2) Restricting network access to the /center/api/installation/detection endpoint by implementing network segmentation and firewall rules to limit exposure only to trusted management networks. 3) Deploying Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads containing command injection patterns such as $( ). 4) Conducting thorough input validation and sanitization on all data submitted to the API, if possible via configuration or custom security controls. 5) Auditing and monitoring logs for unusual command execution attempts or anomalies related to the vulnerable endpoint. 6) Considering temporary disabling or isolating the vulnerable API endpoint if patching is delayed. 7) Educating security teams about the threat to ensure rapid detection and response to potential exploitation attempts. These measures should be integrated into broader security hygiene practices to reduce attack surface and improve resilience.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-22T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f856df8c4621f9a336a1fa

Added to database: 10/22/2025, 4:00:31 AM

Last enriched: 10/22/2025, 4:00:46 AM

Last updated: 10/23/2025, 6:08:42 PM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats