Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information

Posted on September 25, 2025September 25, 2025 By CWS

A crucial vulnerability in Hikvision safety cameras, first disclosed in 2017, is being actively exploited by hackers to achieve unauthorized entry to delicate info.

SANS researchers noticed a current surge in malicious exercise focusing on a selected flaw, recognized as CVE-2017-7921, which carries a crucial severity rating of 10.0 on the CVSS scale.

The exploit makes an attempt are characterised by suspicious net requests to particular URLs on weak cameras, equivalent to /System/deviceInfo?auth=YWRtaW46MTEK.

The base64 encoded string within the request YWRtaW46MTEK, decodes to admin:11. This means that attackers should not utilizing a classy backdoor however are reasonably making an attempt to brute-force units with weak and simply guessable passwords.

Hikvision Digicam Vulnerability Exploited

The core of the difficulty lies in a vulnerability within the firmware of quite a few Hikvision digicam fashions that enables improper authentication. This flaw permits a distant, unauthenticated attacker to bypass safety measures and escalate their privileges, successfully gaining management over the system.

By sending a specifically crafted request, an attacker can obtain the digicam’s configuration file, which can comprise person credentials, and even change person passwords to lock out official house owners.

Whereas Hikvision has launched firmware patches to deal with this vulnerability, a whole lot of hundreds of units stay unpatched and uncovered on the web.

The issue is compounded by the truth that many different producers rebrand and promote Hikvision cameras underneath their very own names, making it troublesome for customers to determine if their units are affected.

A profitable exploit can have extreme penalties. Attackers cannot solely view dwell and recorded footage but in addition use the compromised digicam as a pivot level to launch additional assaults in opposition to the interior community.

The downloaded configuration information, although encrypted, use weak encryption with a static key, making it doable for attackers to decrypt them and harvest person credentials.

The present wave of assaults seems to be making the most of poor safety practices by customers. The usage of a easy password like “11” could also be because of the restricted person interface on some Hikvision DVRs, which frequently characteristic solely a numeric on-screen keyboard, making it cumbersome to enter advanced alphanumeric passwords.

Whereas inserting credentials in a URL is discouraged because of the danger of them being logged, it’s a handy characteristic that enables for creating direct login hyperlinks.

To mitigate the danger, house owners of Hikvision cameras are strongly suggested to replace their units’ firmware to the most recent model. It’s also essential to make use of robust, distinctive passwords and to keep away from exposing the digicam’s administration interface on to the web.

If distant entry is important, it needs to be carried out via a safe VPN connection.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Camera, Exploiting, Hackers, Hikvision, Information, Sensitive, Vulnerability

Post navigation

Previous Post: BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features
Next Post: Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Related Posts

Cybersecurity Newsletter Weekly – Discord, Red Hat Data Breach, 7-Zip Vulnerabilities and Sonicwall Firewall Hack Cyber Security News
Threat Actors Leveraging compromised RDP Logins to Deploy Lynx Ransomware After Deleting Server Backups Cyber Security News
Threat Actors Gaining Access to Victims’ Machines and Monetizing Access to Their Bandwidth Cyber Security News
NVIDIA Triton Vulnerability Chain Let Attackers Take Over AI Server Control Cyber Security News
Phishing Attacks Using AI-Powered Platforms to Misleads Users and Evades Security Tools Cyber Security News
10 Best Malware Analysis Tools Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Hackers Leveraging WhatsApp That Silently Harvest Logs and Contact Details
  • Elite Cyber Veterans Launch Blast Security with $10M to Turn Cloud Detection into Prevention
  • PoC released for W3 Total Cache Vulnerability that Exposes 1+ Million Websites to RCE Attacks
  • CISA Confirms Exploitation of Recent Oracle Identity Manager Vulnerability
  • 800+ npm Packages and Thousands of GitHub Repos Compromised

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2025 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark