Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
History

Tue, 01 Jul 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 01 Jul 2025 15:00:00 +0000

Type Values Removed Values Added
Description Hikvision Streaming Media Management Server v2.3.5 uses default credentials that allow remote attackers to authenticate and access restricted functionality. After authenticating with these credentials, an attacker can exploit an arbitrary file read vulnerability in the /systemLog/downFile.php endpoint via directory traversal in the fileName parameter. This exploit chain can enable unauthorized access to sensitive system files.
Title Hikvision Streaming Media Management Server Default Credentials and Authenticated Arbitrary File Read
Weaknesses CWE-22
CWE-521
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2025-07-01T14:48:40.033Z

Updated: 2025-07-01T18:38:53.665Z

Reserved: 2025-04-15T19:15:22.549Z

Link: CVE-2025-34058

cve-icon Vulnrichment

Updated: 2025-07-01T18:38:48.655Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-07-01T15:15:24.340

Modified: 2025-07-03T15:14:12.767

Link: CVE-2025-34058

cve-icon Redhat

No data.