CVE-2025-39247
Hikvision HikCentral Professional vulnerability analysis and mitigation

Overview

A critical Access Control Vulnerability (CVE-2025-39247) was discovered in HikCentral Professional versions between V2.3.1 and V2.6.2, as well as Version V3.0.0. The vulnerability, disclosed on August 28, 2025, allows an unauthenticated user to obtain administrative permissions in the system. The flaw received a CVSS v3.1 base score of 8.6, indicating high severity (Hikvision Advisory, Security Online).

Technical details

The vulnerability is characterized by insufficient authentication checks in HikCentral Professional's access control mechanism. It has been assigned a CVSS v3.1 vector string of CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N, indicating that it can be exploited remotely with low attack complexity, requires no privileges or user interaction, has changed scope, and can result in high confidentiality impact without affecting integrity or availability (NVD, Hikvision Advisory).

Impact

The exploitation of this vulnerability could allow attackers to bypass access controls and gain administrative privileges in HikCentral Professional deployments. Once admin rights are obtained, adversaries can potentially reconfigure system settings, create new accounts, or deploy additional malware. Given HikCentral's role in video management and enterprise control systems, successful exploitation could lead to compromise of surveillance infrastructure and manipulation of access policies (Security Online).

Mitigation and workarounds

Hikvision has released patches to address this vulnerability. Users are advised to upgrade to either HikCentral Professional version 2.6.3 or version 3.0.1, both of which include fixes that close the authentication loophole and strengthen session management. Organizations should contact their regional technical support teams to obtain the patched versions (Hikvision Advisory).

Additional resources


SourceThis report was generated using AI

Related Hikvision HikCentral Professional vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2025-39247HIGH8.6
  • Hikvision HikCentral ProfessionalHikvision HikCentral Professional
  • cpe:2.3:a:hikvision:hikcentral_professional
NoNoAug 29, 2025
CVE-2024-25063HIGH7.5
  • Hikvision HikCentral ProfessionalHikvision HikCentral Professional
  • cpe:2.3:a:hikvision:hikcentral_professional
NoYesMar 02, 2024
CVE-2024-47487HIGH7.2
  • Hikvision HikCentral ProfessionalHikvision HikCentral Professional
  • cpe:2.3:a:hikvision:hikcentral_professional
NoYesOct 18, 2024
CVE-2024-25064MEDIUM4.3
  • Hikvision HikCentral ProfessionalHikvision HikCentral Professional
  • cpe:2.3:a:hikvision:hikcentral_professional
NoYesMar 02, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management