CVE-2022-4987
Received Received - Intake
Path Traversal in Hirschmann HiVision Enables Local Arbitrary Execution

Publication date: 2026-04-03

Last updated on: 2026-04-03

Assigner: VulnCheck

Description
Hirschmann Industrial HiVision version 08.1.03 prior to 08.1.04 and 08.2.00 contains a vulnerability in the execution of user-configured external applications that allows a local attacker to execute arbitrary binaries. Due to insufficient path sanitization, an attacker can place a malicious binary in the execution path of a configured external application, causing it to be executed instead of the intended application. This can result in execution with elevated privileges depending on the context of the external application.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-03
Last Modified
2026-04-03
Generated
2026-05-07
AI Q&A
2026-04-04
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
hirschmann industrial_hivision to 08.1.04 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-426 The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Attack-Flow Graph
AI Powered Q&A
How can this vulnerability impact me? :

This vulnerability can allow a local attacker to execute arbitrary code on the affected system. Because the malicious binary can run with elevated privileges, it may lead to unauthorized actions such as system compromise, data manipulation, or disruption of services.


Can you explain this vulnerability to me?

This vulnerability exists in Hirschmann Industrial HiVision versions prior to 08.1.04 and 08.2.00. It involves the execution of user-configured external applications where insufficient path sanitization allows a local attacker to place a malicious binary in the execution path. As a result, the malicious binary can be executed instead of the intended application.

The attacker can exploit this to run arbitrary binaries, potentially with elevated privileges depending on the context in which the external application runs.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart