CVE-2025-66174: Vulnerability in Hikvision DS-7104HGHI-F1
There is an improper authentication vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and run a series of commands.
AI Analysis
Technical Summary
CVE-2025-66174 is a medium-severity vulnerability identified in Hikvision DS-7104HGHI-F1 digital video recorder (DVR) devices, specifically affecting firmware versions up to and including V4.30.122_201107. The root cause is an improper authentication mechanism implemented on the device's serial port interface, which fails to adequately verify the identity of users attempting to access the device via this port. An attacker with physical access to the device can connect to the serial port and execute a series of commands without needing any authentication credentials. This vulnerability is categorized under CWE-287 (Improper Authentication). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) indicates that the attack can be performed remotely over the network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). However, the description states physical access is required, which suggests the serial port is not exposed remotely, so the CVSS vector may reflect a conservative assessment or a potential misalignment. No patches or exploits are currently publicly available, but the vulnerability poses a risk to the confidentiality of data accessible via the device and could lead to limited denial of service. The vulnerability affects a widely used Hikvision model often deployed in surveillance systems, making it a concern for organizations relying on these devices for security monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-66174 primarily revolves around the potential compromise of surveillance infrastructure confidentiality and availability. If an attacker gains physical access to affected Hikvision DVRs, they could execute unauthorized commands, potentially extracting sensitive video footage or disrupting recording capabilities. This could undermine security monitoring, delay incident response, and expose sensitive environments to further attacks. Critical sectors such as government facilities, transportation hubs, energy plants, and large enterprises that deploy Hikvision devices for surveillance could face increased risk of espionage or sabotage. The limited availability impact suggests that while full device takeover is unlikely, partial service disruption could occur. The confidentiality impact, though limited, is significant given the sensitive nature of surveillance data. The requirement for physical access reduces the attack surface but does not eliminate risk, especially in environments where devices are accessible in less secure locations or where insider threats exist.
Mitigation Recommendations
1. Enforce strict physical security controls to prevent unauthorized access to DVR devices, including locked enclosures and restricted access areas. 2. Monitor and audit physical access logs to detect and respond to unauthorized attempts promptly. 3. Segregate network and device management interfaces to minimize exposure of serial ports and other low-level access points. 4. Regularly check for firmware updates from Hikvision and apply patches as soon as they become available to address this and other vulnerabilities. 5. Implement device hardening best practices, such as disabling unused ports and interfaces where possible. 6. Use tamper-evident seals or alarms on physical devices to detect unauthorized access attempts. 7. Train security personnel to recognize and respond to physical tampering indicators. 8. Consider deploying additional monitoring solutions that can detect anomalous device behavior indicative of exploitation attempts. 9. Maintain an inventory of all deployed Hikvision devices and their firmware versions to prioritize remediation efforts. 10. Engage with Hikvision support or trusted security vendors for guidance on secure configuration and mitigation strategies specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland
CVE-2025-66174: Vulnerability in Hikvision DS-7104HGHI-F1
Description
There is an improper authentication vulnerability in some Hikvision DVR products. Due to the improper implementation of authentication for the serial port, an attacker with physical access could exploit this vulnerability by connecting to the affected products and run a series of commands.
AI-Powered Analysis
Technical Analysis
CVE-2025-66174 is a medium-severity vulnerability identified in Hikvision DS-7104HGHI-F1 digital video recorder (DVR) devices, specifically affecting firmware versions up to and including V4.30.122_201107. The root cause is an improper authentication mechanism implemented on the device's serial port interface, which fails to adequately verify the identity of users attempting to access the device via this port. An attacker with physical access to the device can connect to the serial port and execute a series of commands without needing any authentication credentials. This vulnerability is categorized under CWE-287 (Improper Authentication). The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L) indicates that the attack can be performed remotely over the network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), limited confidentiality impact (C:L), no integrity impact (I:N), and low availability impact (A:L). However, the description states physical access is required, which suggests the serial port is not exposed remotely, so the CVSS vector may reflect a conservative assessment or a potential misalignment. No patches or exploits are currently publicly available, but the vulnerability poses a risk to the confidentiality of data accessible via the device and could lead to limited denial of service. The vulnerability affects a widely used Hikvision model often deployed in surveillance systems, making it a concern for organizations relying on these devices for security monitoring.
Potential Impact
For European organizations, the impact of CVE-2025-66174 primarily revolves around the potential compromise of surveillance infrastructure confidentiality and availability. If an attacker gains physical access to affected Hikvision DVRs, they could execute unauthorized commands, potentially extracting sensitive video footage or disrupting recording capabilities. This could undermine security monitoring, delay incident response, and expose sensitive environments to further attacks. Critical sectors such as government facilities, transportation hubs, energy plants, and large enterprises that deploy Hikvision devices for surveillance could face increased risk of espionage or sabotage. The limited availability impact suggests that while full device takeover is unlikely, partial service disruption could occur. The confidentiality impact, though limited, is significant given the sensitive nature of surveillance data. The requirement for physical access reduces the attack surface but does not eliminate risk, especially in environments where devices are accessible in less secure locations or where insider threats exist.
Mitigation Recommendations
1. Enforce strict physical security controls to prevent unauthorized access to DVR devices, including locked enclosures and restricted access areas. 2. Monitor and audit physical access logs to detect and respond to unauthorized attempts promptly. 3. Segregate network and device management interfaces to minimize exposure of serial ports and other low-level access points. 4. Regularly check for firmware updates from Hikvision and apply patches as soon as they become available to address this and other vulnerabilities. 5. Implement device hardening best practices, such as disabling unused ports and interfaces where possible. 6. Use tamper-evident seals or alarms on physical devices to detect unauthorized access attempts. 7. Train security personnel to recognize and respond to physical tampering indicators. 8. Consider deploying additional monitoring solutions that can detect anomalous device behavior indicative of exploitation attempts. 9. Maintain an inventory of all deployed Hikvision devices and their firmware versions to prioritize remediation efforts. 10. Engage with Hikvision support or trusted security vendors for guidance on secure configuration and mitigation strategies specific to this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hikvision
- Date Reserved
- 2025-11-24T08:59:35.903Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6944f80919341fe18889df1f
Added to database: 12/19/2025, 7:00:25 AM
Last enriched: 12/26/2025, 8:04:04 AM
Last updated: 2/7/2026, 2:26:35 AM
Views: 109
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2071: Buffer Overflow in UTT 进取 520W
HighCVE-2026-25762: CWE-400: Uncontrolled Resource Consumption in adonisjs core
HighCVE-2026-25754: CWE-1321: Improperly Controlled Modification of Object Prototype Attributes ('Prototype Pollution') in adonisjs core
HighCVE-2026-25644: CWE-295: Improper Certificate Validation in datahub-project datahub
HighCVE-2026-25804: CWE-287: Improper Authentication in antrea-io antrea
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.