Hikvision Vulnerability Allows Unauthorized Access to Surveillance Systems
A critical Hikvision vulnerability (CVE-2017-7921) has been added to CISA’s Known Exploited Vulnerabilities catalog, allowing attackers to bypass authentication and access surveillance systems, exposing security cameras, network data, and sensitive surveillance footage.
A severe cybersecurity vulnerability has been uncovered in various Hikvision surveillance products, causing alarm among enterprises that rely on these cameras for security monitoring. The issue, identified as CVE-2017-7921, was added to the Known Exploited Vulnerabilities (KEV) database on March 5, 2026. Security experts warn that this vulnerability may allow attackers to obtain unauthorized access to surveillance systems without valid login credentials.
The fundamental issue with this vulnerability is incorrect authentication, which implies the system does not properly check a user before granting access. Authentication checks in a secure system ensure that only authorized users have control or access to the device. However, in this instance, hackers can bypass the login system by sending specially crafted inputs to the Hikvision device.
When attackers exploit the flaws, they may get administrative access to the surveillance system. This can pose major security issues. Hackers might potentially access live camera feeds, recorded surveillance footage, and essential configuration information. These files may even include network information or passwords.
The risk increases because many IP cameras and surveillance equipment are directly connected to business networks. If a Hikvision camera gets compromised, attackers may use it to gain access to other parts of the network. Cybercriminals may use the hijacked device to track building activities or conduct additional attacks on company networks and personnel PCs.
Because of these risks, cybersecurity agencies are urging organizations to take quick action. The Cybersecurity and Infrastructure Security Agency (CISA) has set a deadline of March 26, 2026, for federal agencies to address this vulnerability. Security teams are advised to start by checking their networks for Hikvision devices, including IP cameras and network video recorders. If affected devices are found, administrators should apply the latest firmware updates and security patches provided by Hikvision. If devices are too old and no updates are available, experts recommend removing or replacing the hardware to avoid potential cyberattacks. Acting swiftly can help to defend both physical security systems and corporate networks from major threats.
This vulnerability shows how unsecured surveillance devices can become serious cybersecurity risks. Organizations should immediately update or replace affected Hikvision devices to prevent unauthorized access. Taking quick action can help protect both physical security systems and internal networks from potential cyber threats.
Information referenced in this article is from Cyber Security News