Description
An unauthenticated remote command execution vulnerability exists in the applyCT component of the Hikvision Integrated Security Management Platform due to the use of a vulnerable version of the Fastjson library. The endpoint /bic/ssoService/v1/applyCT deserializes untrusted user input, allowing an attacker to trigger Fastjson's auto-type feature to load arbitrary Java classes. By referencing a malicious class via an LDAP URL, an attacker can achieve remote code execution on the underlying system. Exploitation evidence was observed by the Shadowserver Foundation on 2025-02-05 UTC.
Problem types
CWE-502 Deserialization of Untrusted Data
Product status
Any version
References
github.com/... applyCT Fastjson远程命令执行漏洞.md
s4e.io/tools/hikvision-applyct-remote-code-execution
vulncheck.com/advisories/hikvision-ismp-rce-applyct