CVE-2025-34067

An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
CVSS

No CVSS.

Configurations

No configuration.

History

20 Nov 2025, 19:16

Type Values Removed Values Added
Summary (en) An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-08 UTC. (en) An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.

13 Nov 2025, 19:15

Type Values Removed Values Added
CWE CWE-917
Summary (en) An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. (en) An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-08 UTC.

07 Jul 2025, 15:15

Type Values Removed Values Added
References
  • {'url': 'https://vulncheck.com/advisories/hikvision-hik-central-remote-command-execution', 'source': 'disclosure@vulncheck.com'}
  • () https://vulncheck.com/advisories/hikvision-ismp-rce-applyct -

03 Jul 2025, 15:13

Type Values Removed Values Added
Summary
  • (es) Existe una vulnerabilidad de ejecución remota de comandos no autenticados en el componente applyCT de Hikvision Integrated Security Management Platform debido al uso de una versión vulnerable de la librería Fastjson. El endpoint /bic/ssoService/v1/applyCT deserializa la entrada de usuario no confiable, lo que permite a un atacante activar la función de autotipado de Fastjson para cargar clases Java arbitrarias. Al referenciar una clase maliciosa mediante una URL LDAP, un atacante puede ejecutar código remoto en el sistema subyacente.

02 Jul 2025, 14:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-02 14:15

Updated : 2025-11-20 19:16


NVD link : CVE-2025-34067

Mitre link : CVE-2025-34067

CVE.ORG link : CVE-2025-34067


JSON object : View

Products Affected

No product.

CWE
CWE-502

Deserialization of Untrusted Data