Vulnerabilites related to Hangzhou Hikvision System Technology - Streaming Media Management Server
CVE-2025-34058 (GCVE-0-2025-34058)
Vulnerability from cvelistv5
Published
2025-07-01 14:48
Modified
2025-07-01 18:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
References
▼ | URL | Tags |
---|---|---|
https://www.cnvd.org.cn/flaw/show/CNVD-2021-14544 | third-party-advisory | |
https://blog.csdn.net/qq_40684306/article/details/115278837 | exploit | |
https://www.hikvision.com/en/support/cybersecurity/security-advisory/ | product | |
https://vulncheck.com/advisories/hikvision-streaming-server-default-creds-file-read | third-party-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Hangzhou Hikvision System Technology | Streaming Media Management Server |
Version: 2.3.5 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-34058", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-07-01T18:38:34.613255Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-07-01T18:38:53.665Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "modules": [ "/login.php endpoint", "/systemLog/downFile.php endpoint", "fileName parameter" ], "product": "Streaming Media Management Server", "vendor": "Hangzhou Hikvision System Technology", "versions": [ { "status": "affected", "version": "2.3.5" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files." } ], "value": "Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files." } ], "impacts": [ { "capecId": "CAPEC-16", "descriptions": [ { "lang": "en", "value": "CAPEC-16 Dictionary-based Password Attack" } ] }, { "capecId": "CAPEC-126", "descriptions": [ { "lang": "en", "value": "CAPEC-126 Path Traversal" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 8.7, "baseSeverity": "HIGH", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "HIGH", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-521", "description": "CWE-521 Weak Password Requirements", "lang": "en", "type": "CWE" } ] }, { "descriptions": [ { "cweId": "CWE-22", "description": "CWE-22 Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-01T14:48:40.033Z", "orgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "shortName": "VulnCheck" }, "references": [ { "tags": [ "third-party-advisory" ], "url": "https://www.cnvd.org.cn/flaw/show/CNVD-2021-14544" }, { "tags": [ "exploit" ], "url": "https://blog.csdn.net/qq_40684306/article/details/115278837" }, { "tags": [ "product" ], "url": "https://www.hikvision.com/en/support/cybersecurity/security-advisory/" }, { "tags": [ "third-party-advisory" ], "url": "https://vulncheck.com/advisories/hikvision-streaming-server-default-creds-file-read" } ], "source": { "discovery": "UNKNOWN" }, "tags": [ "x_known-exploited-vulnerability" ], "title": "Hikvision Streaming Media Management Server Default Credentials and Authenticated Arbitrary File Read", "x_generator": { "engine": "Vulnogram 0.2.0" } } }, "cveMetadata": { "assignerOrgId": "83251b91-4cc7-4094-a5c7-464a1b83ea10", "assignerShortName": "VulnCheck", "cveId": "CVE-2025-34058", "datePublished": "2025-07-01T14:48:40.033Z", "dateReserved": "2025-04-15T19:15:22.549Z", "dateUpdated": "2025-07-01T18:38:53.665Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }