CVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered that validation of incoming XML format request messages is inadequate. This vulnerability could allow an attacker to XSS on the user's browser. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
AI Analysis
Technical Summary
CVE-2025-8075 is a vulnerability identified in the Hanwha Vision QNV-C8012 device, specifically related to improper input validation (CWE-20) of incoming XML format request messages. The flaw resides in the device's handling of XML data, where insufficient validation allows maliciously crafted XML payloads to be processed, leading to cross-site scripting (XSS) attacks on the user's browser. This XSS vulnerability enables an attacker to inject and execute arbitrary scripts within the context of the device's web interface, potentially hijacking user sessions, stealing sensitive information, or performing unauthorized actions. The vulnerability requires network access to the device and low-level privileges with partial authentication, but no user interaction is necessary for exploitation. The affected versions are all prior to firmware version 2.22.05, which the vendor has patched. The vulnerability was discovered by Nozomi Networks Labs, a security firm specializing in ICS and OT/IoT security, highlighting the device's use in industrial or operational technology environments. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), partial authentication required (AT:P), low privileges (PR:L), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly (VC:N/VI:N/VA:N), but with high scope and security requirements (SC:H/SI:H/SA:H). No public exploits have been reported yet, but the vulnerability's nature suggests potential for targeted attacks against organizations using these devices.
Potential Impact
For European organizations, especially those deploying Hanwha Vision QNV-C8012 devices in critical infrastructure, surveillance, or industrial control systems, this vulnerability presents a risk of unauthorized script execution within device management interfaces. Successful exploitation could lead to session hijacking, credential theft, or manipulation of device settings, undermining operational security and potentially enabling further lateral movement within networks. Given the device's role in video surveillance and possibly OT environments, attackers could gain footholds that compromise physical security monitoring or industrial processes. The medium severity reflects that while direct impact on system availability or data confidentiality is limited, the XSS could serve as a stepping stone for more complex attacks. European entities with stringent data protection regulations (e.g., GDPR) must consider the risk of data exposure or unauthorized access resulting from such vulnerabilities. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from advanced persistent threat (APT) actors targeting European critical sectors.
Mitigation Recommendations
Organizations should immediately verify the firmware version of all Hanwha Vision QNV-C8012 devices and apply the vendor's patch firmware version 2.22.05 or later. Network segmentation should be enforced to limit access to the device's management interfaces, restricting them to trusted administrative networks only. Implement strict access controls and monitor for unusual activity on these devices. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking malicious XML payloads or XSS attempts targeting the device. Regularly audit device configurations and logs for signs of exploitation attempts. Additionally, educate administrators about the risks of XSS and ensure secure password policies and multi-factor authentication where supported. If patching is delayed, consider disabling web management interfaces or restricting them via VPN or secure tunnels to reduce exposure.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Poland, Sweden, Finland
CVE-2025-8075: CWE-20 Improper Input Validation in Hanwha Vision Co., Ltd. QNV-C8012
Description
Cybersecurity Nozomi Networks Labs, a specialized security company focused on Industrial Control Systems (ICS) and OT/IoT security, has discovered that validation of incoming XML format request messages is inadequate. This vulnerability could allow an attacker to XSS on the user's browser. The manufacturer has released patch firmware for the flaw, please refer to the manufacturer's report for details and workarounds.
AI-Powered Analysis
Technical Analysis
CVE-2025-8075 is a vulnerability identified in the Hanwha Vision QNV-C8012 device, specifically related to improper input validation (CWE-20) of incoming XML format request messages. The flaw resides in the device's handling of XML data, where insufficient validation allows maliciously crafted XML payloads to be processed, leading to cross-site scripting (XSS) attacks on the user's browser. This XSS vulnerability enables an attacker to inject and execute arbitrary scripts within the context of the device's web interface, potentially hijacking user sessions, stealing sensitive information, or performing unauthorized actions. The vulnerability requires network access to the device and low-level privileges with partial authentication, but no user interaction is necessary for exploitation. The affected versions are all prior to firmware version 2.22.05, which the vendor has patched. The vulnerability was discovered by Nozomi Networks Labs, a security firm specializing in ICS and OT/IoT security, highlighting the device's use in industrial or operational technology environments. The CVSS 4.0 vector indicates a network attack vector (AV:N), low attack complexity (AC:L), partial authentication required (AT:P), low privileges (PR:L), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly (VC:N/VI:N/VA:N), but with high scope and security requirements (SC:H/SI:H/SA:H). No public exploits have been reported yet, but the vulnerability's nature suggests potential for targeted attacks against organizations using these devices.
Potential Impact
For European organizations, especially those deploying Hanwha Vision QNV-C8012 devices in critical infrastructure, surveillance, or industrial control systems, this vulnerability presents a risk of unauthorized script execution within device management interfaces. Successful exploitation could lead to session hijacking, credential theft, or manipulation of device settings, undermining operational security and potentially enabling further lateral movement within networks. Given the device's role in video surveillance and possibly OT environments, attackers could gain footholds that compromise physical security monitoring or industrial processes. The medium severity reflects that while direct impact on system availability or data confidentiality is limited, the XSS could serve as a stepping stone for more complex attacks. European entities with stringent data protection regulations (e.g., GDPR) must consider the risk of data exposure or unauthorized access resulting from such vulnerabilities. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially from advanced persistent threat (APT) actors targeting European critical sectors.
Mitigation Recommendations
Organizations should immediately verify the firmware version of all Hanwha Vision QNV-C8012 devices and apply the vendor's patch firmware version 2.22.05 or later. Network segmentation should be enforced to limit access to the device's management interfaces, restricting them to trusted administrative networks only. Implement strict access controls and monitor for unusual activity on these devices. Employ web application firewalls (WAFs) or intrusion detection/prevention systems (IDS/IPS) capable of detecting and blocking malicious XML payloads or XSS attempts targeting the device. Regularly audit device configurations and logs for signs of exploitation attempts. Additionally, educate administrators about the risks of XSS and ensure secure password policies and multi-factor authentication where supported. If patching is delayed, consider disabling web management interfaces or restricting them via VPN or secure tunnels to reduce exposure.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Hanwha_Vision
- Date Reserved
- 2025-07-23T06:07:30.973Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 694e12d9f3548aedd14cdc88
Added to database: 12/26/2025, 4:45:13 AM
Last enriched: 12/26/2025, 5:00:16 AM
Last updated: 12/26/2025, 8:24:35 AM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-59888: CWE-428 Unquoted Search Path or Element in Eaton UPS Companion software
MediumCVE-2025-59887: CWE-427 Uncontrolled Search Path Element in Eaton Eaton UPS Companion Software
HighCVE-2025-67450: CWE-427 Uncontrolled Search Path Element in Eaton UPS Companion software
HighCVE-2025-62578: CWE-319 Cleartext Transmission of Sensitive Information in Delta Electronics DVP-12SE
HighCVE-2025-52601: CWE-321: Use of Hard-coded Cryptographic Key in Hanwha Vision Co., Ltd. Device Manager
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.