Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63408: n/a

0
Medium
VulnerabilityCVE-2025-63408cvecve-2025-63408
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-63408 is a medium severity local vulnerability in Agent DVR versions up to 6. 6. 1. 0 that allows unauthenticated local attackers to perform directory traversal. This flaw can lead to unauthorized access to sensitive information, server-side request forgery (SSRF), and remote OS command execution. Exploitation requires local access but no privileges or user interaction. The vulnerability stems from improper input validation, enabling attackers to manipulate file paths and execute commands. No known exploits are currently reported in the wild. European organizations using Agent DVR for video surveillance or monitoring should prioritize patching once available. Mitigations include restricting local access, monitoring for suspicious activity, and applying vendor updates promptly.

AI-Powered Analysis

AILast updated: 11/25/2025, 17:17:41 UTC

Technical Analysis

CVE-2025-63408 affects Local Agent DVR software versions through 6.6.1.0 and involves a directory traversal vulnerability that can be exploited by an unauthenticated local attacker. The vulnerability arises from insufficient validation of file path inputs, allowing attackers to traverse directories beyond intended boundaries. This can lead to unauthorized access to sensitive files on the host system. Additionally, the flaw enables server-side request forgery (SSRF), where the attacker can coerce the server to make arbitrary HTTP requests, potentially accessing internal network resources. More critically, the vulnerability also allows execution of arbitrary operating system commands, which can lead to full system compromise. The CVSS v3.1 base score is 5.1 (medium), reflecting that the attack vector is local (AV:L), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The impact affects confidentiality and integrity but not availability. The vulnerability is categorized under CWE-918 (Server-Side Request Forgery) and CWE-78 (OS Command Injection). No patches or exploits are currently publicly available, but the risk remains significant for environments where local access can be obtained. Organizations using Agent DVR for surveillance or monitoring should be aware of this vulnerability and prepare to apply fixes once released.

Potential Impact

For European organizations, the impact of CVE-2025-63408 can be significant in environments where Agent DVR is deployed, especially in sectors relying on video surveillance such as critical infrastructure, transportation, manufacturing, and public safety. Unauthorized local access could lead to exposure of sensitive video footage or configuration files, compromising privacy and operational security. SSRF exploitation could allow attackers to pivot into internal networks, potentially accessing other critical systems. OS command execution could result in full system compromise, data theft, or disruption of monitoring services. Although exploitation requires local access, insider threats or attackers who gain initial footholds through other means could leverage this vulnerability to escalate privileges or move laterally. The medium CVSS score indicates moderate risk, but the potential for serious confidentiality and integrity breaches means organizations should not underestimate the threat. The lack of known exploits currently provides a window for proactive mitigation.

Mitigation Recommendations

1. Restrict local access to systems running Agent DVR by enforcing strict access controls and network segmentation to limit who can reach these hosts. 2. Monitor logs and system behavior for unusual file access patterns or unexpected network requests indicative of SSRF attempts. 3. Apply principle of least privilege to all users and services interacting with Agent DVR to minimize potential attack surface. 4. Once available, promptly apply vendor patches or updates addressing CVE-2025-63408. 5. Consider deploying host-based intrusion detection systems (HIDS) to detect command injection attempts or anomalous OS command executions. 6. Conduct regular security audits and vulnerability scans on systems running Agent DVR to identify and remediate weaknesses. 7. Educate local administrators and users about the risks of unauthorized local access and enforce strong authentication mechanisms. 8. If patching is delayed, consider temporary mitigations such as disabling unnecessary features or services within Agent DVR that could be exploited.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691c901eb718280d68a97e55

Added to database: 11/18/2025, 3:26:22 PM

Last enriched: 11/25/2025, 5:17:41 PM

Last updated: 1/7/2026, 9:55:26 AM

Views: 54

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats