HIKVISION applyCT Remote Code Execution Scanner

Detects 'Remote Code Execution (RCE)' vulnerability in HIKVISION applyCT.

Short Info


Level

Critical

Single Scan

Single Scan

Can be used by

Asset Owner

Estimated Time

10 seconds

Time Interval

16 days 20 hours

Scan only one

Domain, IPv4, Subdomain

Toolbox

-

The HIKVISION applyCT is a comprehensive security management platform widely used by businesses and organizations for surveillance and security management. Developed by HIKVISION, a leading provider of security products and solutions, this platform helps users monitor multiple security devices efficiently. It provides a centralized interface for managing security devices, making it an integral part of security operations. HIKVISION applyCT is integrated with advanced analytics to enhance surveillance capabilities. The platform is adopted by a diverse range of sectors, including government, commercial, and industrial for robust security infrastructure. Its scalability allows it to cater to both small-scale and large-scale surveillance needs.

Remote Code Execution (RCE) is a severe vulnerability that allows an attacker to execute arbitrary code on a target machine remotely. This type of vulnerability arises when user input is not properly validated, allowing malicious payloads to be executed within the system. RCE can lead to complete system compromise, providing an attacker with full control over the affected system. Exploiting an RCE vulnerability can result in unauthorized data access, system manipulation, or even a distributed network attack. The detection of this vulnerability is crucial for maintaining system integrity and preventing unauthorized exploits. Timely identification and remediation are essential to safeguard data and resources from potential attacks.

The vulnerability in the HIKVISION applyCT platform involves the processing of JSON data via the Fastjson library. An attacker can exploit this by crafting a JSON payload to interact with a specific Java class, `JdbcRowSetImpl`, which allows remote code execution through the LDAP protocol. The malformed payload is sent to the `/bic/ssoService/v1/applyCT` endpoint using a POST request with the `Content-Type` set to `application/json`. By manipulating the datasource parameter to point to an untrusted LDAP server, the attacker can gain control over the server. The vulnerability arises from insufficient input validation, enabling arbitrary class loading and execution of unauthorized code.

Exploitation of this RCE vulnerability can have severe consequences, including unauthorized access to sensitive information, data breaches, and full control over the server. An attacker could inject malicious code to perform any number of actions, from stealing confidential data to disrupting service operations. Such security breaches can lead to financial loss, reputational damage, and legal liabilities. It also poses risks of further propagation of attacks within the network, affecting additional systems and applications. Addressing this vulnerability is critical to prevent unauthorized activities and ensure the safety and reliability of the system operations.

REFERENCES

Get started to protecting your Free Full Security Scan