CVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered that validation of incoming XML format request messages is inadequate. This vulnerability could allow an attacker to XSS on the user's browser. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
AI Analysis
Technical Summary
CVE-2025-8075 is a vulnerability identified in the Hanwha Vision QNV-C8012 device, specifically related to improper input validation (CWE-20) of incoming XML format request messages. The flaw resides in the device's handling of XML data, where insufficient validation allows maliciously crafted XML payloads to be processed, leading to cross-site scripting (XSS) attacks on the user's browser. This XSS vulnerability enables an attacker to inject and execute arbitrary scripts within the context of the device's web interface, potentially hijacking user sessions, stealing sensitive information, or performing unauthorized actions. The vulnerability requires network access to the device and low-level privileges with partial authentication, but no user interaction is necessary for exploitation. The affected versions are all prior to firmware version 2.22.05, which the vendor has patched. The vulnerability was discovered by Nozomi Networks Labs, a security firm specializing in ICS and OT/IoT security, highlighting the device's use in industrial or operational technology environments. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), partial authentication required (AT:P), low privileges (PR:L), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly (VC:N/VI:N/VA:N), but with high scope and security requirements (SC:H/SI:H/SA:H). No public exploits have been reported yet, but the vulnerability's nature suggests potential for targeted attacks against organizations using these devices.
Potential Impact
For European organizations, especially those deploying Hanwha Vision QNV-C8012 devices in critical infrastructure, surveillance, or industrial control systems, this vulnerability presents a risk of unauthorized script execution within device management interfaces. Successful exploitation could lead to session hijacking, credential theft, or manipulation of device settings, undermining operational security and potentially enabling further lateral movement within networks. Given the device's role in video surveillance and possibly OT environments, attackers could gain footholds that compromise physical security monitoring or industrial processes. The medium severity reflects that while direct impact on system availability or data confidentiality is limited, the XSS could serve as a stepping stone for more complex attacks. European entities with stringent data protection regulations (e.g., GDPR) must consider the risk of data exposure or unauthorized access resulting from such vulnerabilities. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from advanced persistent threat (APT) actors targeting European critical sectors.
Mitigation Recommendations
Organizations should immediately verify the firmware version of all Hanwha Vision QNV-C8012 devices and apply the vendor's patch firmware version 2.22.05 or later. Network segmentation should be enforced to limit access to the device's management interfaces, restricting them to trusted administrative networks only. Implement strict access controls and monitor for unusual activity on these devices. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking malicious XML payloads or XSS attempts targeting the device. Regularly audit device configurations and logs for signs of exploitation attempts. Additionally, educate administrators about the risks of XSS and ensure secure password policies and multi-factor authentication where supported. If patching is delayed, consider disabling web management interfaces or restricting them via VPN or secure tunnels to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
Description
Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered that validation of incoming XML format request messages is inadequate. This vulnerability could allow an attacker to XSS on the user's browser. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2025-8075 is a vulnerability identified in the Hanwha Vision QNV-C8012 device, specifically related to improper input validation (CWE-20) of incoming XML format request messages. The flaw resides in the device's handling of XML data, where insufficient validation allows maliciously crafted XML payloads to be processed, leading to cross-site scripting (XSS) attacks on the user's browser. This XSS vulnerability enables an attacker to inject and execute arbitrary scripts within the context of the device's web interface, potentially hijacking user sessions, stealing sensitive information, or performing unauthorized actions. The vulnerability requires network access to the device and low-level privileges with partial authentication, but no user interaction is necessary for exploitation. The affected versions are all prior to firmware version 2.22.05, which the vendor has patched. The vulnerability was discovered by Nozomi Networks Labs, a security firm specializing in ICS and OT/IoT security, highlighting the device's use in industrial or operational technology environments. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), partial authentication required (AT:P), low privileges (PR:L), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly (VC:N/VI:N/VA:N), but with high scope and security requirements (SC:H/SI:H/SA:H). No public exploits have been reported yet, but the vulnerability's nature suggests potential for targeted attacks against organizations using these devices.
Potential Impact
For European organizations, especially those deploying Hanwha Vision QNV-C8012 devices in critical infrastructure, surveillance, or industrial control systems, this vulnerability presents a risk of unauthorized script execution within device management interfaces. Successful exploitation could lead to session hijacking, credential theft, or manipulation of device settings, undermining operational security and potentially enabling further lateral movement within networks. Given the device's role in video surveillance and possibly OT environments, attackers could gain footholds that compromise physical security monitoring or industrial processes. The medium severity reflects that while direct impact on system availability or data confidentiality is limited, the XSS could serve as a stepping stone for more complex attacks. European entities with stringent data protection regulations (e.g., GDPR) must consider the risk of data exposure or unauthorized access resulting from such vulnerabilities. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from advanced persistent threat (APT) actors targeting European critical sectors.
Mitigation Recommendations
Organizations should immediately verify the firmware version of all Hanwha Vision QNV-C8012 devices and apply the vendor's patch firmware version 2.22.05 or later. Network segmentation should be enforced to limit access to the device's management interfaces, restricting them to trusted administrative networks only. Implement strict access controls and monitor for unusual activity on these devices. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking malicious XML payloads or XSS attempts targeting the device. Regularly audit device configurations and logs for signs of exploitation attempts. Additionally, educate administrators about the risks of XSS and ensure secure password policies and multi-factor authentication where supported. If patching is delayed, consider disabling web management interfaces or restricting them via VPN or secure tunnels to reduce exposure.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Hanwha_Vision
- Date Reserved
- 2025-07-23T06:07:30.973Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694e12d9f3548aedd14cdc88
Added to database: 12/26/2025, 4:45:13 AM
Last enriched: 12/26/2025, 5:00:16 AM
Last updated: 2/6/2026, 5:44:55 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2059: SQL Injection in SourceCodester Medical Center Portal Management System
MediumCVE-2025-13523: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Mattermost Mattermost Confluence Plugin
HighCVE-2026-2103: CWE-321 in Infor SyteLine ERP
HighCVE-2026-2058: SQL Injection in mathurvishal CloudClassroom-PHP-Project
MediumCVE-2026-25556: CWE-415 Double Free in Artifex Software MuPDF
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.