CVE-2025-66177: Vulnerability in Hikvision DS-96xxxNI-Hx
CVE-2025-66177 is a high-severity stack overflow vulnerability affecting Hikvision DS-96xxxNI-Hx series devices, including NVRs, DVRs, CVRs, and IPCs. The flaw exists in the Search and Discovery feature and can be exploited by an attacker on the same local area network by sending specially crafted packets. Successful exploitation can cause device malfunction, impacting confidentiality, integrity, and availability. No user interaction or authentication is required, and the attack vector is local network access. The vulnerability affects devices with firmware built before 250807. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk. European organizations using these Hikvision devices, especially in security and surveillance roles, are at risk of service disruption and potential data compromise. Immediate patching and network segmentation are recommended to mitigate this threat.
AI Analysis
Technical Summary
CVE-2025-66177 is a stack overflow vulnerability identified in the Search and Discovery feature of Hikvision DS-96xxxNI-Hx series devices, which include network video recorders (NVRs), digital video recorders (DVRs), cloud video recorders (CVRs), and internet protocol cameras (IPCs). The vulnerability arises due to improper handling of specially crafted packets sent over the local area network, leading to a stack overflow condition. This flaw allows an unauthenticated attacker with access to the same LAN to trigger a malfunction in the device, potentially causing denial of service or enabling further exploitation that compromises device confidentiality and integrity. The vulnerability affects firmware builds dated before 250807. The CVSS v3.1 base score is 8.8, reflecting high severity with attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it a critical concern for environments relying on these devices for security monitoring and recording. The stack overflow could be leveraged to crash devices or potentially execute arbitrary code, depending on further exploitation techniques. The lack of authentication requirement and the local network attack vector emphasize the importance of internal network security controls.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security infrastructure relying on Hikvision DS-96xxxNI-Hx devices. Exploitation can lead to denial of service, disrupting video surveillance and recording capabilities critical for security monitoring, incident investigation, and compliance with regulatory requirements such as GDPR. The compromise of device integrity and confidentiality could allow attackers to manipulate or exfiltrate sensitive surveillance data. Organizations in sectors such as government, transportation, critical infrastructure, and large enterprises that deploy these devices extensively could face operational disruptions and increased exposure to insider threats or lateral movement by attackers. The requirement for local network access means that attackers would need to breach internal network defenses or gain physical proximity, which is plausible in many enterprise environments. The high severity score underscores the potential for widespread impact if exploited in environments with inadequate network segmentation or monitoring.
Mitigation Recommendations
European organizations should immediately identify all Hikvision DS-96xxxNI-Hx devices with firmware built before 250807 and apply vendor-provided patches or firmware updates as soon as they become available. In the absence of patches, network segmentation should be enforced to isolate these devices from general user networks, restricting access to trusted management stations only. Implement strict access controls and monitoring on the local network to detect anomalous packet traffic targeting the Search and Discovery feature. Disable or restrict the Search and Discovery functionality if it is not essential for operations. Employ network intrusion detection systems (NIDS) with signatures or heuristics capable of identifying malformed packets targeting Hikvision devices. Regularly audit device firmware versions and configurations to ensure compliance with security policies. Additionally, physical security controls should be enhanced to prevent unauthorized local network access. Finally, maintain up-to-date asset inventories and incident response plans tailored to address potential disruptions in surveillance infrastructure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Austria
CVE-2025-66177: Vulnerability in Hikvision DS-96xxxNI-Hx
Description
CVE-2025-66177 is a high-severity stack overflow vulnerability affecting Hikvision DS-96xxxNI-Hx series devices, including NVRs, DVRs, CVRs, and IPCs. The flaw exists in the Search and Discovery feature and can be exploited by an attacker on the same local area network by sending specially crafted packets. Successful exploitation can cause device malfunction, impacting confidentiality, integrity, and availability. No user interaction or authentication is required, and the attack vector is local network access. The vulnerability affects devices with firmware built before 250807. Although no known exploits are currently in the wild, the high CVSS score (8. 8) indicates significant risk. European organizations using these Hikvision devices, especially in security and surveillance roles, are at risk of service disruption and potential data compromise. Immediate patching and network segmentation are recommended to mitigate this threat.
AI-Powered Analysis
Technical Analysis
CVE-2025-66177 is a stack overflow vulnerability identified in the Search and Discovery feature of Hikvision DS-96xxxNI-Hx series devices, which include network video recorders (NVRs), digital video recorders (DVRs), cloud video recorders (CVRs), and internet protocol cameras (IPCs). The vulnerability arises due to improper handling of specially crafted packets sent over the local area network, leading to a stack overflow condition. This flaw allows an unauthenticated attacker with access to the same LAN to trigger a malfunction in the device, potentially causing denial of service or enabling further exploitation that compromises device confidentiality and integrity. The vulnerability affects firmware builds dated before 250807. The CVSS v3.1 base score is 8.8, reflecting high severity with attack vector as adjacent network (AV:A), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits have been reported yet, the vulnerability's characteristics make it a critical concern for environments relying on these devices for security monitoring and recording. The stack overflow could be leveraged to crash devices or potentially execute arbitrary code, depending on further exploitation techniques. The lack of authentication requirement and the local network attack vector emphasize the importance of internal network security controls.
Potential Impact
For European organizations, this vulnerability poses a significant risk to physical security infrastructure relying on Hikvision DS-96xxxNI-Hx devices. Exploitation can lead to denial of service, disrupting video surveillance and recording capabilities critical for security monitoring, incident investigation, and compliance with regulatory requirements such as GDPR. The compromise of device integrity and confidentiality could allow attackers to manipulate or exfiltrate sensitive surveillance data. Organizations in sectors such as government, transportation, critical infrastructure, and large enterprises that deploy these devices extensively could face operational disruptions and increased exposure to insider threats or lateral movement by attackers. The requirement for local network access means that attackers would need to breach internal network defenses or gain physical proximity, which is plausible in many enterprise environments. The high severity score underscores the potential for widespread impact if exploited in environments with inadequate network segmentation or monitoring.
Mitigation Recommendations
European organizations should immediately identify all Hikvision DS-96xxxNI-Hx devices with firmware built before 250807 and apply vendor-provided patches or firmware updates as soon as they become available. In the absence of patches, network segmentation should be enforced to isolate these devices from general user networks, restricting access to trusted management stations only. Implement strict access controls and monitoring on the local network to detect anomalous packet traffic targeting the Search and Discovery feature. Disable or restrict the Search and Discovery functionality if it is not essential for operations. Employ network intrusion detection systems (NIDS) with signatures or heuristics capable of identifying malformed packets targeting Hikvision devices. Regularly audit device firmware versions and configurations to ensure compliance with security policies. Additionally, physical security controls should be enhanced to prevent unauthorized local network access. Finally, maintain up-to-date asset inventories and incident response plans tailored to address potential disruptions in surveillance infrastructure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- hikvision
- Date Reserved
- 2025-11-24T08:59:35.903Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6965b0daa60475309ff8e4da
Added to database: 1/13/2026, 2:41:30 AM
Last enriched: 1/13/2026, 2:55:51 AM
Last updated: 1/13/2026, 3:51:20 AM
Views: 27
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-66176: Vulnerability in Hikvision DS-K1T331
HighCVE-2026-0514: CWE-79: Improper Neutralization of Input During Web Page Generation in SAP_SE SAP Business Connector
MediumCVE-2026-0513: CWE-601: URL Redirection to Untrusted Site in SAP_SE SAP Supplier Relationship Management (SICF Handler in SRM Catalog)
MediumCVE-2026-0511: CWE-862: Missing Authorization in SAP_SE SAP Fiori App (Intercompany Balance Reconciliation)
HighCVE-2026-0510: CWE-326: Inadequate Encryption Strength in SAP_SE NW AS Java UME User Mapping
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.