Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets

Multiple Hikvision Vulnerabilities Let Attackers Cause Device Malfunction Using Crafted Packets

Posted on January 13, 2026January 13, 2026 By CWS

Hikvision, a number one supplier of surveillance and entry management techniques, faces critical safety dangers from two newly disclosed stack overflow vulnerabilities.

These flaws, tracked as CVE-2025-66176 and CVE-2025-66177, enable attackers on the identical native space community (LAN) to set off system malfunctions by sending specifically crafted packets. Each carry a excessive CVSS v3.1 base rating of 8.8, indicating vital potential impression with out requiring authentication.

Safety researchers uncovered these points in Hikvision’s system Search and Discovery characteristic, a protocol used for community detection.

Exploitation calls for solely adjoining community entry, comparable to shared Wi-Fi or workplace LANs, making it a primary goal for insiders or opportunistic hackers. An unpatched system may crash completely, disrupting important operations in surveillance setups.

CVE IDAffected ProductsCVSS v3.1 Base ScoreDescriptionCVE-2025-66176Partial Entry Management Sequence Products8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)Stack overflow in Search and Discovery featureCVE-2025-66177Partial NVR, DVR, CVR, IPC Sequence Products8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)Stack overflow in Search and Discovery characteristic

The vector breakdown reveals low complexity: attackers want no privileges (PR:N) and no person interplay (UI:N), with excessive confidentiality, integrity, and availability impacts (C:H/I:H/A:H).

CVE-2025-66176 was reported by a Cisco Talos Workforce member, whereas CVE-2025-66177 got here from unbiased researchers Angel Lozano Alcazar and Pedro Guillen Nuñez. Their disclosures underscore ongoing scrutiny of IoT and surveillance gear, the place stack overflows have repeatedly enabled denial-of-service assaults.

Hikvision urges rapid patching. Customers can obtain firmware updates from the official assist web page. The corporate emphasizes community segmentation and disabling unused discovery options as interim mitigations.

These flaws arrive amid heightened issues over video surveillance safety. Final yr noticed comparable Hikvision advisories, prompting CISA alerts on provide chain dangers. Organizations counting on these gadgets, from good buildings to public security, ought to prioritize scans utilizing instruments like Nmap for uncovered providers.

Specialists warn that unpatched techniques may result in broader incidents, comparable to surveillance blackouts throughout emergencies. “LAN-adjacent assaults decrease the bar for disruption,” famous a Talos spokesperson. As threats evolve, distributors should speed up zero-trust implementations in embedded techniques.

Observe us on Google Information, LinkedIn, and X for every day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Attackers, Crafted, Device, Hikvision, Malfunction, Multiple, Packets, Vulnerabilities

Post navigation

Previous Post: Malicious Chrome Extension Steals Wallet Login Credentials and Enables Automated Trading
Next Post: CISA Warns of Active Exploitation of Gogs Vulnerability Enabling Code Execution

Related Posts

Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach Hacker Threw MacBook in River to Erase Evidence in Coupang Data Breach Cyber Security News
BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts BlackSuit Ransomware Actors Breached Corporate Environment, Including 60+ VMware ESXi hosts Cyber Security News
Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Iranian Threat Actors Attacking U.S. Critical Infrastructure Including Water Systems Cyber Security News
Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT Beware of Weaponized ScreenConnect App That Delivers AsyncRAT and PowerShell RAT Cyber Security News
What Are The Takeaways from The Scattered Lapsus $Hunters Statement? What Are The Takeaways from The Scattered Lapsus $Hunters Statement? Cyber Security News
Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports Breachlock Named Sample Vendor for PTaaS and AEV in Two 2025 Gartner Reports Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News