An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
CVSS
No CVSS.
References
Configurations
No configuration.
History
No history.
Information
Published : 2025-07-02 14:15
Updated : 2025-11-20 19:16
NVD link : CVE-2025-34067
Mitre link : CVE-2025-34067
CVE.ORG link : CVE-2025-34067
JSON object : View
Products Affected
No product.
CWE
CWE-502
Deserialization of Untrusted Data
