CVE-2025-34067

An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system.
CVSS

No CVSS.

Configurations

No configuration.

History

03 Jul 2025, 15:13

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de ejecución remota de comandos no autenticados en el componente applyCT de Hikvision Integrated Security Management Platform debido al uso de una versión vulnerable de la librería Fastjson. El endpoint /bic/ssoService/v1/applyCT deserializa la entrada de usuario no confiable, lo que permite a un atacante activar la función de autotipado de Fastjson para cargar clases Java arbitrarias. Al referenciar una clase maliciosa mediante una URL LDAP, un atacante puede ejecutar código remoto en el sistema subyacente.

02 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-02 14:15

Updated : 2025-07-03 15:13


NVD link : CVE-2025-34067

Mitre link : CVE-2025-34067

CVE.ORG link : CVE-2025-34067


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data

CWE-917

Improper Neutralization of Special Elements used in an Expression Language Statement ('Expression Language Injection')