CVE-2017-7921: Hikvision Improper Authentication Vulnerability

CVE ID: CVE-2017-7921 Vendor: Hikvision Affected Products: Multiple — including DVRs, NVRs, and IP cameras CISA KEV Patch Deadline (Federal Agencies): March 26, 2026


Vulnerability Overview

CVE-2017-7921 is an improper authentication vulnerability affecting multiple Hikvision surveillance products. The flaw allows unauthenticated or low-privileged attackers to escalate privileges and access sensitive system data without valid credentials. Hikvision DVRs, NVRs, and IP cameras deployed across enterprise, government, and critical infrastructure networks are all within scope.

The vulnerability class — improper authentication — means the affected devices fail to enforce adequate authentication controls on sensitive operations or interfaces. An attacker who can reach the management interface of an affected device over the network can bypass credential requirements, escalate to higher privilege levels, and extract sensitive configuration data, credential material, or live video feeds.

The attack vector is network-accessible. No physical access is required. Exploitation does not require prior authentication, lowering the barrier substantially for opportunistic and targeted attackers alike.


Technical Detail

Affected Hikvision products expose management interfaces — commonly on TCP ports 8000, 8080, and 443 — that do not properly validate authentication state before granting access to privileged functions. An attacker sending crafted requests to these interfaces can trigger privilege escalation without supplying valid credentials.

This type of flaw is particularly dangerous on surveillance infrastructure because the devices often carry persistent access to physical security systems, network segments, and sensitive operational environments. Compromised DVRs and NVRs can also serve as persistent network footholds, as they are frequently under-monitored relative to standard IT assets.

Hikvision equipment has been targeted by state-sponsored groups and criminal botnet operators. The Mirai botnet variants and successors have historically targeted IP cameras and DVRs from multiple vendors, including Hikvision devices with weak or default credential configurations. CVE-2017-7921 extends that attack surface by removing the credential requirement entirely on vulnerable firmware versions.


Real-World Impact

Organizations running unpatched Hikvision devices face several concrete risks:

  • Unauthorized access to live and recorded video feeds, exposing physical security operations, personnel movements, and facility layouts.
  • Credential harvesting, where attackers extract stored credentials from device configuration — credentials that may be reused across the network.
  • Persistent network access, using compromised cameras or recorders as pivot points into adjacent network segments.
  • Botnet enrollment, where devices are silently recruited into DDoS infrastructure or cryptomining operations.

Federal civilian agencies in the United States are required under CISA's Known Exploited Vulnerabilities (KEV) catalog mandate to remediate CVE-2017-7921 by March 26, 2026. The inclusion in the KEV catalog confirms active exploitation of this vulnerability in the wild.

Enterprise and critical infrastructure operators outside the federal space carry no binding deadline under KEV, but the exploitation history and low attack complexity make this a high-priority remediation target regardless of sector.


Affected Products

Hikvision has confirmed that multiple product lines are affected. These include but may not be limited to:

  • IP cameras across multiple generations
  • Digital Video Recorders (DVRs)
  • Network Video Recorders (NVRs)

Organizations should consult Hikvision's official security advisory and firmware release notes to confirm whether specific model numbers and firmware versions fall within the vulnerable range.


Patching and Mitigation Guidance

1. Inventory all Hikvision devices. Use network scanning tools (Nmap, Nessus, Qualys, or equivalent) or query your CMDB to identify every Hikvision DVR, NVR, and IP camera in the environment. Shadow IT deployments in physical security or facilities management are common blind spots.

2. Apply Hikvision firmware patches immediately. Hikvision released firmware updates addressing CVE-2017-7921. Download patches directly from Hikvision's official support portal and apply them according to the vendor's update procedures. Do not source firmware from third-party repositories.

3. Isolate management interfaces. Move device management interfaces off public-facing network segments. Enforce access to management ports (TCP 8000, 8080, 443) through VPN or jump host infrastructure. Block direct internet exposure of these ports at the perimeter firewall.

4. Eliminate default credentials. Change all default usernames and passwords on Hikvision devices. Audit for credential reuse between surveillance infrastructure and other network systems.

5. Monitor for exploitation indicators. Enable logging on network devices and monitor for anomalous connection attempts to Hikvision management ports. Alert on authentication events from unexpected source IPs, repeated failed authentication, and unusual outbound connections from camera or recorder IP addresses.

6. Segment surveillance networks. Place Hikvision devices on a dedicated, firewalled VLAN. Restrict lateral movement from the surveillance segment to production or corporate networks using strict ACLs.

For organizations unable to patch immediately, network-level controls — blocking unauthenticated external access and enforcing VPN-only management — provide meaningful risk reduction while remediation is scheduled.