Skip to main content
Mallory

Hirschmann Industrial HiVision Flaws Enable RCE via Auth Bypass and Path Hijacking

industrial-control-system-vulnerabilityidentity-authentication-vulnerabilitywidely-deployed-product-advisoryinitial-access-method
Updated April 3, 2026 at 11:04 PM2 sources
Share:
Hirschmann Industrial HiVision Flaws Enable RCE via Auth Bypass and Path Hijacking

Get Ahead of Threats Like This

Know if you're exposed. Before adversaries strike.

Belden disclosed two high-severity vulnerabilities in Hirschmann Industrial HiVision that can lead to arbitrary code execution. The more serious issue, tracked as CVE-2017-20237, is an authentication bypass in the product's master service that affects versions prior to 06.0.07 and 07.0.03. An unauthenticated remote attacker can invoke exposed interface methods and execute commands with administrative privileges on the underlying operating system, creating a full remote code execution path with high impact to confidentiality, integrity, and availability.

A second flaw, CVE-2022-4987, affects 08.1.03 prior to 08.1.04 and 08.2.00 and stems from improper sanitization of paths used to launch user-configured external applications. In that scenario, a low-privileged local attacker can place a malicious binary in the execution path so it runs instead of the intended program, potentially gaining elevated execution depending on deployment context. The vulnerabilities were documented in Belden security guidance and VulnCheck advisories, highlighting both remote and local routes to code execution in Industrial HiVision deployments.

Timeline

  1. Apr 3, 2026

    VulnCheck receives and publishes records for both Hirschmann Industrial HiVision CVEs

    VulnCheck recorded both CVE-2017-20237 and CVE-2022-4987 as newly received by disclosure@vulncheck.com, adding vulnerability history details and references to the Belden bulletin and VulnCheck advisory. This marks the public cataloging of the two Hirschmann Industrial HiVision vulnerabilities in the referenced feed.

  2. Apr 3, 2026

    Belden discloses external application path hijacking flaw in Industrial HiVision

    Belden published a security bulletin for CVE-2022-4987 in Hirschmann Industrial HiVision. The issue affects version 08.1.03 prior to 08.1.04 and version 08.2.00, allowing a local low-privilege attacker to hijack execution of external applications and potentially achieve arbitrary code execution with elevated privileges.

  3. Apr 3, 2026

    Belden discloses authentication bypass RCE in Hirschmann Industrial HiVision

    Belden published a security bulletin for CVE-2017-20237 affecting Hirschmann Industrial HiVision. The flaw impacts versions prior to 06.0.07 and 07.0.03 and allows unauthenticated remote attackers to invoke exposed interface methods and execute arbitrary commands with administrative privileges.

See the full picture in Mallory

Mallory subscribers get deeper analysis on every story, including:

Impact Assessment

Who’s affected and how

Technical Details

Deep-dive technical analysis

Response Recommendations

Actionable next steps for your team

Indicators of Compromise

IPs, domains, hashes, and more

AI Threads

Ask questions and take action on every story

Advanced Filters

Filter by topic, classification, timeframe

Scheduled Alerts

Get matching stories delivered automatically

Related Stories

Belden HiSecOS Flaw Lets Authenticated Users Gain Administrator Access

Belden HiSecOS Flaw Lets Authenticated Users Gain Administrator Access

Belden disclosed a high-severity privilege-escalation vulnerability, **CVE-2023-7342**, in the **HiSecOS** web server that allows authenticated users with **operator** or **auditor** roles to obtain **administrator** privileges by sending specially crafted packets. Successful exploitation can give an attacker full administrative control of the affected device, raising the risk of unauthorized configuration changes and broader compromise in environments that rely on the platform. A related CVE entry, **CVE-2023-7343**, was published alongside the advisory stream and references a Belden security bulletin, but the available record appears to repeat the HiSecOS privilege-escalation details rather than clearly describing the separate issue named in its title. Both entries were published with **CVSS v3.1** and **CVSS v4.0** scoring metadata and **CWE-269** classification, indicating Belden customers should review the vendor advisories closely to identify affected products and apply any recommended mitigations or updates.

1 months ago
Critical Authentication Bypass in Hirschmann HiOS and HiSecOS Grants Admin Access

Critical Authentication Bypass in Hirschmann HiOS and HiSecOS Grants Admin Access

Hirschmann disclosed a critical vulnerability, tracked as **`CVE-2018-25236`**, in the HTTP(S) management module of multiple **HiOS** and **HiSecOS** product lines, including **RSP, RSPE, RSPS, RSPL, MSP, EES, EESX, GRS, OS, RED, and EAGLE**. The flaw allows an unauthenticated remote attacker to send specially crafted HTTP requests and gain administrative access to affected devices without valid credentials. The issue stems from improper authentication handling that can cause a new request to inherit the authentication state and privileges of a previously authenticated user. Belgium's Centre for Cybersecurity (CCB) issued a warning describing the bug as critical and urged organizations using affected Hirschmann industrial networking products to patch immediately to prevent unauthorized takeover of device management interfaces.

4 weeks ago
Multiple Vulnerabilities in Belden NetModule and Siemens Products Enable RCE

Multiple Vulnerabilities in Belden NetModule and Siemens Products Enable RCE

CERT-FR issued advisories for multiple vulnerabilities affecting **Belden NetModule Router Software** and a range of **Siemens** products. The flaws in Belden NetModule Router Software could allow a remote attacker to execute arbitrary code on affected systems and trigger a remote denial of service, raising concern for organizations that rely on these devices in operational and industrial environments. A separate CERT-FR notice reported multiple vulnerabilities across Siemens products that could enable **remote code execution**, **privilege escalation**, and **remote denial of service**. While the available notice summary did not list specific product names, `CVE` identifiers, or patch details, the combined disclosures indicate broad exposure across industrial technology vendors and underscore the need for defenders to identify affected assets and apply vendor guidance as updates become available.

3 weeks ago

Get Ahead of Threats Like This

Mallory continuously monitors global threat intelligence and correlates it with your attack surface. Know if you're exposed. Before adversaries strike.