Security researchers warn of three vulnerabilities impacting Hikvision HikCentral, which is a centralized management software used across many industries for video surveillance, access control, and integrated security operations.
The three vulnerabilities are:
One of them was rated as high severity, and it stands out because it allows an unauthenticated user to escalate privileges and ultimately gain administrative access to the system. When attackers can elevate their privileges without even logging in, they essentially hold the keys to the entire environment. That creates a direct path to manipulating configurations, tampering with logs, or even shutting down critical monitoring functions.
HikCentral serves as the backbone for many organizations’ security infrastructure. Companies rely on it to manage surveillance cameras, control building access, and integrate data from multiple devices into one cohesive platform. An attacker can exploit the privilege escalation flaw to take over these functions. Once an attacker elevates privileges, they can act as an administrator, install malware, create hidden accounts, or exfiltrate sensitive information. Imagine a scenario where an attacker disables cameras during a physical intrusion, unlocks restricted doors, or modifies audit trails to hide evidence. This scenario poses a serious threat to the safety and business continuity of the impacted organizations.
The affected versions include:
Product Name | CVE ID | Affected Versions | Fixed Version |
HikCentral Master Lite | CVE-2025-39245 | Versions between V2.2.1 and V2.3.2 | V2.4.0 |
HikCentral FocSign | CVE-2025-39246 | Versions between V1.4.0 and V2.2.0 | V2.3.0 |
HikCentral Professional | CVE-2025-39247 | Versions between V2.3.1 and V2.6.2Version V3.0.0 | V2.6.3 or V3.0.1 |
Organizations running these builds should treat this disclosure as a wake-up call.
In HikCentral’s case, the risk increases because attackers don’t even need to authenticate first. They can approach the system anonymously, exploit the flaw, and instantly gain elevated control. This bypass undermines all trust in standard authentication processes.
The Chinese vendor has already released guidance, and the best step forward involves applying updates immediately. HikCentral administrators should:
@securityaffairs and Facebook and Mastodon
Follow me on Twitter:(SecurityAffairs – hacking, Hikvision)