CVE-2025-66173: Vulnerability in Hikvision DS-7104HGHI-F1
There is a privilege escalation vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and gaining access to an unrestricted shell environment.
AI Analysis
Technical Summary
CVE-2025-66173 identifies a privilege escalation vulnerability in the Hikvision DS-7104HGHI-F1 digital video recorder (DVR) product line. The root cause is an improper authentication mechanism on the device's serial port interface. Specifically, the device fails to enforce adequate authentication controls when accessed via the serial port, allowing an attacker with physical access to bypass normal security restrictions. By connecting directly to the serial port, an attacker can obtain an unrestricted shell environment, effectively gaining full control over the device's operating system and functions. This can lead to unauthorized access to video feeds, manipulation or deletion of recordings, and potentially pivoting to other networked systems. The vulnerability affects firmware versions up to and including V4.30.122_201107. The CVSS 3.1 score is 6.2 (medium severity), reflecting that exploitation requires physical access (AV:P), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (all high). No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The CWE classification is CWE-269, indicating improper privilege management. This vulnerability is particularly concerning for environments where physical security of devices is not guaranteed, such as public or semi-public locations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Hikvision DS-7104HGHI-F1 DVRs in security and surveillance roles. Unauthorized shell access allows attackers to manipulate video surveillance data, potentially erasing evidence or disabling monitoring capabilities, which undermines physical security and incident response. Confidentiality of video feeds can be compromised, exposing sensitive information. Integrity and availability of the device and recorded data are at risk, potentially disrupting security operations. Organizations in critical infrastructure sectors, transportation, government facilities, and large enterprises using these devices are particularly vulnerable. The requirement for physical access limits remote exploitation but does not eliminate risk in environments where devices are accessible to unauthorized personnel. This vulnerability could also facilitate lateral movement within a network if the DVR is connected to internal systems. The absence of known exploits reduces immediate risk but does not preclude targeted attacks or insider threats.
Mitigation Recommendations
1. Physically secure all Hikvision DS-7104HGHI-F1 devices to prevent unauthorized access to serial ports, including locking enclosures and restricting access to authorized personnel only. 2. Monitor and audit physical access logs and surveillance device locations regularly to detect unauthorized presence. 3. Apply firmware updates or patches from Hikvision as soon as they become available to address this vulnerability. 4. If firmware updates are not yet available, consider isolating affected devices on segmented networks with strict access controls to limit potential lateral movement. 5. Disable or restrict serial port access where possible, or implement additional physical or logical controls to prevent unauthorized connections. 6. Employ network monitoring to detect unusual activity originating from DVR devices that could indicate compromise. 7. Incorporate this vulnerability into risk assessments and incident response plans, emphasizing physical security controls. 8. Engage with Hikvision support or authorized vendors for guidance on interim mitigations and future patch timelines.
Affected Countries
Germany, France, Italy, Spain, United Kingdom, Netherlands, Belgium, Poland
CVE-2025-66173: Vulnerability in Hikvision DS-7104HGHI-F1
Description
There is a privilege escalation vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and gaining access to an unrestricted shell environment.
AI-Powered Analysis
Technical Analysis
CVE-2025-66173 identifies a privilege escalation vulnerability in the Hikvision DS-7104HGHI-F1 digital video recorder (DVR) product line. The root cause is an improper authentication mechanism on the device's serial port interface. Specifically, the device fails to enforce adequate authentication controls when accessed via the serial port, allowing an attacker with physical access to bypass normal security restrictions. By connecting directly to the serial port, an attacker can obtain an unrestricted shell environment, effectively gaining full control over the device's operating system and functions. This can lead to unauthorized access to video feeds, manipulation or deletion of recordings, and potentially pivoting to other networked systems. The vulnerability affects firmware versions up to and including V4.30.122_201107. The CVSS 3.1 score is 6.2 (medium severity), reflecting that exploitation requires physical access (AV:P), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (all high). No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The CWE classification is CWE-269, indicating improper privilege management. This vulnerability is particularly concerning for environments where physical security of devices is not guaranteed, such as public or semi-public locations.
Potential Impact
For European organizations, the impact of this vulnerability can be significant, especially for those relying on Hikvision DS-7104HGHI-F1 DVRs in security and surveillance roles. Unauthorized shell access allows attackers to manipulate video surveillance data, potentially erasing evidence or disabling monitoring capabilities, which undermines physical security and incident response. Confidentiality of video feeds can be compromised, exposing sensitive information. Integrity and availability of the device and recorded data are at risk, potentially disrupting security operations. Organizations in critical infrastructure sectors, transportation, government facilities, and large enterprises using these devices are particularly vulnerable. The requirement for physical access limits remote exploitation but does not eliminate risk in environments where devices are accessible to unauthorized personnel. This vulnerability could also facilitate lateral movement within a network if the DVR is connected to internal systems. The absence of known exploits reduces immediate risk but does not preclude targeted attacks or insider threats.
Mitigation Recommendations
1. Physically secure all Hikvision DS-7104HGHI-F1 devices to prevent unauthorized access to serial ports, including locking enclosures and restricting access to authorized personnel only. 2. Monitor and audit physical access logs and surveillance device locations regularly to detect unauthorized presence. 3. Apply firmware updates or patches from Hikvision as soon as they become available to address this vulnerability. 4. If firmware updates are not yet available, consider isolating affected devices on segmented networks with strict access controls to limit potential lateral movement. 5. Disable or restrict serial port access where possible, or implement additional physical or logical controls to prevent unauthorized connections. 6. Employ network monitoring to detect unusual activity originating from DVR devices that could indicate compromise. 7. Incorporate this vulnerability into risk assessments and incident response plans, emphasizing physical security controls. 8. Engage with Hikvision support or authorized vendors for guidance on interim mitigations and future patch timelines.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hikvision
- Date Reserved
- 2025-11-24T08:59:35.902Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6944f80919341fe18889df1c
Added to database: 12/19/2025, 7:00:25 AM
Last enriched: 12/26/2025, 8:04:50 AM
Last updated: 2/7/2026, 3:38:54 PM
Views: 88
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2089: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.