CVE-2025-45851: n/a
An issue in Hikvision DS-2CD1321-I V5.7.21 build 230819 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the endpoint /ISAPI/Security/challenge. The vendor has stated that upgrading to V5.7.23_SP2 fixes the issue.
AI Analysis
Technical Summary
CVE-2025-45851 is a vulnerability identified in the Hikvision DS-2CD1321-I network camera firmware version V5.7.21 build 230819. The flaw allows an attacker to cause a Denial of Service (DoS) condition by sending a specially crafted POST request to the endpoint /ISAPI/Security/challenge. This endpoint is part of the device's security challenge mechanism, likely involved in authentication or session management. Exploiting this vulnerability results in the device becoming unresponsive or crashing, thereby disrupting its normal operation. Since the vulnerability is triggered via a network request, it can be exploited remotely without physical access. The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit if the device is exposed to untrusted networks. No CVSS score has been assigned yet, and there are no known public exploits in the wild at the time of publication. The affected product is a widely deployed IP camera model used in surveillance systems, often integrated into security infrastructure for physical security monitoring.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security systems relying on Hikvision DS-2CD1321-I cameras. A successful DoS attack could disable surveillance capabilities, creating blind spots in security coverage and increasing the risk of unauthorized access, theft, or sabotage. Critical infrastructure facilities, government buildings, transportation hubs, and private enterprises using these cameras could face operational disruptions and increased security risks. Additionally, the downtime caused by the DoS could delay incident detection and response, amplifying potential damage. Since these cameras are often network-connected and sometimes accessible from external networks, the attack surface is considerable. The lack of authentication requirement for exploitation further elevates the threat level. Although no exploits are currently known in the wild, the vulnerability's existence may attract attackers to develop weaponized exploits, especially in geopolitical contexts where surveillance systems are targeted.
Mitigation Recommendations
Organizations should immediately assess their deployment of Hikvision DS-2CD1321-I cameras to identify devices running firmware version V5.7.21 build 230819. Until an official patch is released, network-level mitigations should be applied: restrict access to the cameras' management interfaces by implementing strict firewall rules limiting inbound traffic to trusted IP addresses only; isolate the cameras on segmented VLANs to reduce exposure; disable remote access if not required; and monitor network traffic for unusual POST requests targeting the /ISAPI/Security/challenge endpoint. Additionally, organizations should engage with Hikvision or authorized vendors to obtain firmware updates or advisories addressing this vulnerability. Implementing intrusion detection systems (IDS) with signatures to detect anomalous POST requests to the affected endpoint can provide early warning. Regularly reviewing and updating device firmware and maintaining an asset inventory will help manage such vulnerabilities proactively.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-45851: n/a
Description
An issue in Hikvision DS-2CD1321-I V5.7.21 build 230819 allows attackers to cause a Denial of Service (DoS) via sending a crafted POST request to the endpoint /ISAPI/Security/challenge. The vendor has stated that upgrading to V5.7.23_SP2 fixes the issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-45851 is a vulnerability identified in the Hikvision DS-2CD1321-I network camera firmware version V5.7.21 build 230819. The flaw allows an attacker to cause a Denial of Service (DoS) condition by sending a specially crafted POST request to the endpoint /ISAPI/Security/challenge. This endpoint is part of the device's security challenge mechanism, likely involved in authentication or session management. Exploiting this vulnerability results in the device becoming unresponsive or crashing, thereby disrupting its normal operation. Since the vulnerability is triggered via a network request, it can be exploited remotely without physical access. The vulnerability does not require authentication or user interaction, making it easier for attackers to exploit if the device is exposed to untrusted networks. No CVSS score has been assigned yet, and there are no known public exploits in the wild at the time of publication. The affected product is a widely deployed IP camera model used in surveillance systems, often integrated into security infrastructure for physical security monitoring.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security systems relying on Hikvision DS-2CD1321-I cameras. A successful DoS attack could disable surveillance capabilities, creating blind spots in security coverage and increasing the risk of unauthorized access, theft, or sabotage. Critical infrastructure facilities, government buildings, transportation hubs, and private enterprises using these cameras could face operational disruptions and increased security risks. Additionally, the downtime caused by the DoS could delay incident detection and response, amplifying potential damage. Since these cameras are often network-connected and sometimes accessible from external networks, the attack surface is considerable. The lack of authentication requirement for exploitation further elevates the threat level. Although no exploits are currently known in the wild, the vulnerability's existence may attract attackers to develop weaponized exploits, especially in geopolitical contexts where surveillance systems are targeted.
Mitigation Recommendations
Organizations should immediately assess their deployment of Hikvision DS-2CD1321-I cameras to identify devices running firmware version V5.7.21 build 230819. Until an official patch is released, network-level mitigations should be applied: restrict access to the cameras' management interfaces by implementing strict firewall rules limiting inbound traffic to trusted IP addresses only; isolate the cameras on segmented VLANs to reduce exposure; disable remote access if not required; and monitor network traffic for unusual POST requests targeting the /ISAPI/Security/challenge endpoint. Additionally, organizations should engage with Hikvision or authorized vendors to obtain firmware updates or advisories addressing this vulnerability. Implementing intrusion detection systems (IDS) with signatures to detect anomalous POST requests to the affected endpoint can provide early warning. Regularly reviewing and updating device firmware and maintaining an asset inventory will help manage such vulnerabilities proactively.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- mitre
- Date Reserved
- 2025-04-22T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 685e8c6cca1063fb875df1c6
Added to database: 6/27/2025, 12:19:56 PM
Last enriched: 6/27/2025, 12:31:56 PM
Last updated: 11/22/2025, 3:23:01 PM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-30806: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Sangfor Net-Gen Application Firewall
CriticalCVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.