Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-63408: n/a

0
Medium
VulnerabilityCVE-2025-63408cvecve-2025-63408
Published: Tue Nov 18 2025 (11/18/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

Local Agent DVR versions thru 6.6.1.0 are vulnerable to directory traversal that allows an unauthenticated local attacker to gain access to sensitive information, cause a server-side forgery request (SSRF), or execute OS commands.

AI-Powered Analysis

AILast updated: 11/18/2025, 15:34:04 UTC

Technical Analysis

CVE-2025-63408 is a directory traversal vulnerability affecting Local Agent DVR software versions through 6.6.1.0. The flaw allows an unauthenticated attacker with local access to traverse directories beyond the intended scope, enabling unauthorized access to sensitive files. This can lead to disclosure of confidential information stored on the system. Additionally, the vulnerability enables server-side request forgery (SSRF), allowing the attacker to make arbitrary requests from the server to internal or external resources, potentially bypassing network restrictions. More critically, the attacker can execute arbitrary operating system commands, which could lead to full system compromise. The vulnerability stems from insufficient input validation and improper sanitization of file path parameters. Exploitation requires local access but no authentication, meaning any user or process with local system access could leverage this flaw. No public exploits are currently known, and no CVSS score has been assigned yet. However, the combination of information disclosure, SSRF, and command execution makes this a significant threat. The vulnerability is particularly concerning for environments where Local Agent DVR is deployed on critical infrastructure or where local access controls are lax. The lack of patch links indicates that a fix may not yet be available, emphasizing the need for immediate mitigation steps.

Potential Impact

For European organizations, the impact of CVE-2025-63408 can be severe. Local Agent DVR is commonly used in video surveillance and monitoring systems, which are critical for physical security in enterprises, government facilities, and public infrastructure. Exploitation could lead to unauthorized access to sensitive video footage or configuration files, violating privacy regulations such as GDPR. SSRF capabilities could allow attackers to pivot within internal networks, accessing otherwise protected systems or services. The ability to execute OS commands elevates the risk to full system compromise, potentially allowing attackers to install malware, disrupt operations, or exfiltrate data. This threat is particularly impactful in sectors like transportation, energy, and public safety, where surveillance systems are integral. The local access requirement limits remote exploitation but does not eliminate risk, especially in environments with shared or poorly controlled access. The absence of known exploits in the wild provides a window for proactive defense, but organizations should act swiftly to mitigate potential damage.

Mitigation Recommendations

1. Immediately restrict local access to systems running Local Agent DVR to trusted personnel only, enforcing strict access controls and monitoring. 2. Implement application whitelisting and endpoint protection to detect and prevent unauthorized command execution. 3. Monitor system logs and network traffic for unusual activity indicative of SSRF or directory traversal attempts. 4. Segregate surveillance systems from general IT networks to limit lateral movement in case of compromise. 5. Apply patches or updates from the vendor as soon as they become available; maintain close communication with the vendor for release information. 6. Conduct regular security audits and vulnerability scans focusing on Local Agent DVR deployments. 7. Use file integrity monitoring to detect unauthorized changes to critical files. 8. Educate local users about the risks of unauthorized access and enforce strong local authentication mechanisms where possible. 9. Consider temporary disabling or isolating vulnerable instances if patching is delayed. 10. Prepare incident response plans specific to DVR system compromises.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-10-27T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 691c901eb718280d68a97e55

Added to database: 11/18/2025, 3:26:22 PM

Last enriched: 11/18/2025, 3:34:04 PM

Last updated: 11/19/2025, 6:47:50 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats