Hikvision Camera Vulnerability Actively Exploited, CISA Warns Agencies to Patch Immediately


A critical vulnerability affecting multiple Hikvision surveillance products is drawing fresh security attention after it was added to the U.S. government’s Known Exploited Vulnerabilities (KEV) catalog. The flaw, tracked as CVE-2017-7921, allows attackers to bypass authentication controls and gain administrative access to affected devices.

Security experts warn that organizations running unpatched Hikvision cameras or network video recorders could expose sensitive surveillance feeds and network data to attackers. The vulnerability carries a critical severity rating and can be exploited remotely without credentials, which makes it particularly dangerous for internet-connected devices.

The issue stems from improper authentication logic inside the firmware of certain Hikvision cameras, allowing a remote attacker to impersonate authorized users or elevate privileges. Once exploited, attackers may access configuration files, change credentials, or retrieve stored surveillance data from the device.

Cybersecurity agencies warn that many affected cameras remain exposed online because organizations continue using outdated firmware or legacy devices that never received patches.

Why the Hikvision vulnerability is serious

Security researchers say the flaw sits inside the authentication process used by the device’s management interface. When attackers send specially crafted requests to the camera’s web interface, the system fails to properly verify the user’s identity.

This allows attackers to operate the device as if they had administrator privileges.

Possible consequences include:

  • Accessing live surveillance video streams
  • Downloading stored camera recordings
  • Extracting device configuration files
  • Resetting user passwords or creating new accounts
  • Using the compromised device as a foothold inside corporate networks

Researchers have observed attackers scanning the internet for vulnerable cameras and digital video recorders that still run outdated firmware.

In large organizations, surveillance cameras often connect to internal networks. If attackers compromise those devices, they may move laterally toward more sensitive systems.

Key technical details of CVE-2017-7921

CategoryDetails
Vulnerability IDCVE-2017-7921
TypeImproper authentication (CWE-287)
SeverityCritical
CVSS ScoreUp to 10.0
Attack RequirementsRemote, no credentials required
ImpactPrivilege escalation and unauthorized access

Improper authentication occurs when a system does not correctly verify a user’s identity before granting access to restricted functions. This flaw can allow attackers to escalate privileges and obtain sensitive information.

Products potentially affected

The vulnerability originally affected several Hikvision IP camera series and related surveillance products running specific firmware versions.

Devices that may be exposed include:

  • Hikvision IP cameras
  • Network Video Recorders (NVRs)
  • OEM cameras based on Hikvision firmware
  • Rebranded surveillance products using Hikvision hardware

Some devices sold under other brand names may also be vulnerable because they use the same firmware base.

Why IoT devices are frequent targets

Internet-connected cameras belong to a broader category known as Internet of Things (IoT) devices. These devices often receive fewer updates than traditional software systems.

Attackers frequently target them because:

  • Devices run outdated firmware
  • Default passwords remain unchanged
  • Security monitoring tools rarely inspect IoT traffic
  • Many devices remain exposed directly to the internet

Security researchers have observed malware campaigns scanning for vulnerable cameras, including those affected by CVE-2017-7921, to build botnets or gather intelligence.

Security agencies and vendors recommend immediate action to prevent exploitation.

Organizations should take the following steps:

  • Identify all Hikvision devices connected to the network
  • Check firmware versions against vendor security advisories
  • Apply the latest available firmware updates
  • Restrict remote access to surveillance devices
  • Place cameras on isolated network segments
  • Disable unnecessary services such as remote administration

If devices cannot receive updates due to hardware limitations, organizations should remove them from production networks or replace them with supported models.

Quick checklist for administrators

  • Inventory all surveillance devices on the network
  • Update firmware immediately if patches exist
  • Change all default credentials
  • Disable direct internet exposure
  • Monitor network logs for unusual camera activity

FAQ

What is CVE-2017-7921?

CVE-2017-7921 is a critical authentication bypass vulnerability affecting certain Hikvision surveillance devices. It allows attackers to access the device without valid credentials.

What can attackers do if they exploit this vulnerability?

Attackers can access surveillance feeds, retrieve recordings, extract configuration files, and modify system settings.

Is the vulnerability still relevant today?

Yes. Many devices remain vulnerable because organizations continue using outdated firmware or unsupported hardware.

How can organizations protect themselves?

Administrators should apply firmware updates from Hikvision, isolate surveillance devices from critical networks, and remove unsupported hardware.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages