Description

A critical security vulnerability affecting multiple Hikvision surveillance products has been actively exploited and recently added to the U.S. The flaw has been included in the Known Exploited Vulnerabilities (KEV) catalog maintained by the Cybersecurity and Infrastructure Security Agency (CISA). The flaw, tracked as CVE-2017-7921, allows attackers to bypass authentication mechanisms and gain unauthorized administrative access to affected devices. Successful exploitation could enable adversaries to monitor surveillance feeds, extract sensitive data, and potentially pivot into internal enterprise networks. The vulnerability stems from an improper authentication flaw (CWE-287) within several Hikvision camera and network video recorder (NVR) devices. Normally, authentication mechanisms verify user credentials before allowing access to administrative or system-level features. However, this flaw enables attackers to bypass the login process entirely without requiring valid credentials. By exploiting the weakness, threat actors can escalate privileges and gain full administrative control over the targeted device. With this level of access, attackers may view real-time camera feeds, download stored surveillance footage, and gather intelligence about physical security operations or facility activity. Beyond surveillance exposure, compromised devices may also serve as entry points into broader enterprise networks. Attackers could leverage infected cameras as pivot nodes to conduct lateral movement or launch further attacks against internal infrastructure. Although the vulnerability was originally disclosed several years ago, its addition to the KEV catalog indicates renewed exploitation activity in the wild.