An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system.
CVSS
No CVSS.
References
Configurations
No configuration.
History
03 Jul 2025, 15:13
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
02 Jul 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-07-02 14:15
Updated : 2025-07-03 15:13
NVD link : CVE-2025-34067
Mitre link : CVE-2025-34067
CVE.ORG link : CVE-2025-34067
JSON object : View
Products Affected
No product.