Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66173: Vulnerability in Hikvision DS-7104HGHI-F1

0
Medium
VulnerabilityCVE-2025-66173cvecve-2025-66173
Published: Fri Dec 19 2025 (12/19/2025, 06:39:38 UTC)
Source: CVE Database V5
Vendor/Project: Hikvision
Product: DS-7104HGHI-F1

Description

There is a privilege escalation vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and gaining access to an unrestricted shell environment.

AI-Powered Analysis

AILast updated: 12/26/2025, 08:04:50 UTC

Technical Analysis

CVE-2025-66173 identifies a privilege escalation vulnerability in the Hikvision DS-7104HGHI-F1 digital video recorder (DVR) product line. The root cause is an improper authentication mechanism on the device's serial port interface. Specifically, the device fails to enforce adequate authentication controls when accessed via the serial port, allowing an attacker with physical access to bypass normal security restrictions. By connecting directly to the serial port, an attacker can obtain an unrestricted shell environment, effectively gaining full control over the device's operating system and functions. This can lead to unauthorized access to video feeds, manipulation or deletion of recordings, and potentially pivoting to other networked systems. The vulnerability affects firmware versions up to and including V4.30.122_201107. The CVSS 3.1 score is 6.2 (medium severity), reflecting that exploitation requires physical access (AV:P), low attack complexity (AC:L), high privileges (PR:H), no user interaction (UI:N), and impacts confidentiality, integrity, and availability (all high). No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed proactively. The CWE classification is CWE-269, indicating improper privilege management. This vulnerability is particularly concerning for environments where physical security of devices is not guaranteed, such as public or semi-public locations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those relying on Hikvision DS-7104HGHI-F1 DVRs in security and surveillance roles. Unauthorized shell access allows attackers to manipulate video surveillance data, potentially erasing evidence or disabling monitoring capabilities, which undermines physical security and incident response. Confidentiality of video feeds can be compromised, exposing sensitive information. Integrity and availability of the device and recorded data are at risk, potentially disrupting security operations. Organizations in critical infrastructure sectors, transportation, government facilities, and large enterprises using these devices are particularly vulnerable. The requirement for physical access limits remote exploitation but does not eliminate risk in environments where devices are accessible to unauthorized personnel. This vulnerability could also facilitate lateral movement within a network if the DVR is connected to internal systems. The absence of known exploits reduces immediate risk but does not preclude targeted attacks or insider threats.

Mitigation Recommendations

1. Physically secure all Hikvision DS-7104HGHI-F1 devices to prevent unauthorized access to serial ports, including locking enclosures and restricting access to authorized personnel only. 2. Monitor and audit physical access logs and surveillance device locations regularly to detect unauthorized presence. 3. Apply firmware updates or patches from Hikvision as soon as they become available to address this vulnerability. 4. If firmware updates are not yet available, consider isolating affected devices on segmented networks with strict access controls to limit potential lateral movement. 5. Disable or restrict serial port access where possible, or implement additional physical or logical controls to prevent unauthorized connections. 6. Employ network monitoring to detect unusual activity originating from DVR devices that could indicate compromise. 7. Incorporate this vulnerability into risk assessments and incident response plans, emphasizing physical security controls. 8. Engage with Hikvision support or authorized vendors for guidance on interim mitigations and future patch timelines.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
hikvision
Date Reserved
2025-11-24T08:59:35.902Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6944f80919341fe18889df1c

Added to database: 12/19/2025, 7:00:25 AM

Last enriched: 12/26/2025, 8:04:50 AM

Last updated: 2/2/2026, 11:30:38 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats