CVE-2025-66173: Vulnerability in Hikvision DS-7104HGHI-F1
There is a privilege escalation vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and gaining access to an unrestricted shell environment.
AI Analysis
Technical Summary
CVE-2025-66173 is a privilege escalation vulnerability identified in the Hikvision DS-7104HGHI-F1 digital video recorder (DVR) product line. The root cause is an improper authentication mechanism on the device's serial port interface, which is intended for maintenance or debugging purposes. Due to this flaw, an attacker who gains physical access to the device can connect directly to the serial port and bypass authentication controls, thereby obtaining an unrestricted shell environment. This shell access effectively grants the attacker full control over the device, allowing them to execute arbitrary commands, manipulate stored video footage, alter device configurations, or disrupt device operations. The vulnerability affects firmware versions up to and including V4.30.122_201107. The CVSS 3.1 base score is 6.2, categorized as medium severity, with the vector indicating physical access (AV:P), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although exploitation requires physical access, the impact on security monitoring and forensic capabilities is significant, especially in environments relying on these DVRs for surveillance. There are no known public exploits or active exploitation campaigns reported as of the publication date. The vulnerability was reserved on 2025-11-24 and published on 2025-12-19. No official patches or mitigation links have been provided yet, indicating the need for immediate risk management and physical security controls.
Potential Impact
For European organizations, the impact of CVE-2025-66173 can be substantial, particularly for those relying on Hikvision DS-7104HGHI-F1 DVRs for critical surveillance and security monitoring. Successful exploitation compromises the confidentiality of recorded footage, potentially exposing sensitive or private information. Integrity is also at risk as attackers can alter or delete video evidence, undermining trust in security systems and complicating incident investigations. Availability may be disrupted if attackers disable or destabilize the device. This can lead to gaps in surveillance coverage, increasing the risk of undetected physical intrusions or other security incidents. The requirement for physical access limits the threat to environments where attackers can reach the device directly, such as poorly secured server rooms, remote sites, or public-facing installations. However, insider threats or attackers gaining physical access through social engineering or theft pose realistic risks. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially given the high impact potential. European organizations in sectors like critical infrastructure, transportation, government facilities, and large enterprises using these DVRs should assess exposure and implement compensating controls promptly.
Mitigation Recommendations
1. Restrict physical access to Hikvision DS-7104HGHI-F1 devices by securing server rooms, cabinets, and DVR enclosures with locks and access control systems. 2. Monitor and log physical access to areas housing these devices to detect unauthorized entry attempts. 3. Until official patches are released, consider disabling or physically disconnecting the serial port interface if feasible, to prevent exploitation via this vector. 4. Implement strict inventory and asset management to identify all affected devices and prioritize their protection. 5. Deploy network segmentation and monitoring to detect anomalous device behavior that may indicate compromise. 6. Train staff on the risks of physical access attacks and enforce policies to prevent unauthorized personnel from accessing sensitive equipment. 7. Regularly check for firmware updates from Hikvision and apply patches promptly once available. 8. Consider replacing affected devices with models not vulnerable to this issue if physical security cannot be guaranteed. 9. Conduct periodic security audits and penetration tests focusing on physical security controls around surveillance infrastructure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-66173: Vulnerability in Hikvision DS-7104HGHI-F1
Description
There is a privilege escalation vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and gaining access to an unrestricted shell environment.
AI-Powered Analysis
Technical Analysis
CVE-2025-66173 is a privilege escalation vulnerability identified in the Hikvision DS-7104HGHI-F1 digital video recorder (DVR) product line. The root cause is an improper authentication mechanism on the device's serial port interface, which is intended for maintenance or debugging purposes. Due to this flaw, an attacker who gains physical access to the device can connect directly to the serial port and bypass authentication controls, thereby obtaining an unrestricted shell environment. This shell access effectively grants the attacker full control over the device, allowing them to execute arbitrary commands, manipulate stored video footage, alter device configurations, or disrupt device operations. The vulnerability affects firmware versions up to and including V4.30.122_201107. The CVSS 3.1 base score is 6.2, categorized as medium severity, with the vector indicating physical access (AV:P), low attack complexity (AC:L), high privileges required (PR:H), no user interaction (UI:N), unchanged scope (S:U), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although exploitation requires physical access, the impact on security monitoring and forensic capabilities is significant, especially in environments relying on these DVRs for surveillance. There are no known public exploits or active exploitation campaigns reported as of the publication date. The vulnerability was reserved on 2025-11-24 and published on 2025-12-19. No official patches or mitigation links have been provided yet, indicating the need for immediate risk management and physical security controls.
Potential Impact
For European organizations, the impact of CVE-2025-66173 can be substantial, particularly for those relying on Hikvision DS-7104HGHI-F1 DVRs for critical surveillance and security monitoring. Successful exploitation compromises the confidentiality of recorded footage, potentially exposing sensitive or private information. Integrity is also at risk as attackers can alter or delete video evidence, undermining trust in security systems and complicating incident investigations. Availability may be disrupted if attackers disable or destabilize the device. This can lead to gaps in surveillance coverage, increasing the risk of undetected physical intrusions or other security incidents. The requirement for physical access limits the threat to environments where attackers can reach the device directly, such as poorly secured server rooms, remote sites, or public-facing installations. However, insider threats or attackers gaining physical access through social engineering or theft pose realistic risks. The absence of known exploits reduces immediate urgency but does not eliminate the threat, especially given the high impact potential. European organizations in sectors like critical infrastructure, transportation, government facilities, and large enterprises using these DVRs should assess exposure and implement compensating controls promptly.
Mitigation Recommendations
1. Restrict physical access to Hikvision DS-7104HGHI-F1 devices by securing server rooms, cabinets, and DVR enclosures with locks and access control systems. 2. Monitor and log physical access to areas housing these devices to detect unauthorized entry attempts. 3. Until official patches are released, consider disabling or physically disconnecting the serial port interface if feasible, to prevent exploitation via this vector. 4. Implement strict inventory and asset management to identify all affected devices and prioritize their protection. 5. Deploy network segmentation and monitoring to detect anomalous device behavior that may indicate compromise. 6. Train staff on the risks of physical access attacks and enforce policies to prevent unauthorized personnel from accessing sensitive equipment. 7. Regularly check for firmware updates from Hikvision and apply patches promptly once available. 8. Consider replacing affected devices with models not vulnerable to this issue if physical security cannot be guaranteed. 9. Conduct periodic security audits and penetration tests focusing on physical security controls around surveillance infrastructure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hikvision
- Date Reserved
- 2025-11-24T08:59:35.902Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6944f80919341fe18889df1c
Added to database: 12/19/2025, 7:00:25 AM
Last enriched: 12/19/2025, 7:15:59 AM
Last updated: 12/19/2025, 8:01:20 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66501: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. pdfonline.foxit.com
MediumCVE-2025-66500: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Foxit Software Inc. webplugins.foxit.com
MediumCVE-2025-66499: CWE-190 Integer Overflow or Wraparound in Foxit Software Inc. Foxit PDF Reader
HighCVE-2025-66498: CWE-125 Out-of-bounds Read in Foxit Software Inc. Foxit PDF Reader
MediumCVE-2025-66497: CWE-125 Out-of-bounds Read in Foxit Software Inc. Foxit PDF Reader
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.