Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Exploiting Hikvision Camera Vulnerability to Access Sensitive Information

Posted on September 25, 2025September 25, 2025 By CWS

A crucial vulnerability in Hikvision safety cameras, first disclosed in 2017, is being actively exploited by hackers to achieve unauthorized entry to delicate info.

SANS researchers noticed a current surge in malicious exercise focusing on a selected flaw, recognized as CVE-2017-7921, which carries a crucial severity rating of 10.0 on the CVSS scale.

The exploit makes an attempt are characterised by suspicious net requests to particular URLs on weak cameras, equivalent to /System/deviceInfo?auth=YWRtaW46MTEK.

The base64 encoded string within the request YWRtaW46MTEK, decodes to admin:11. This means that attackers should not utilizing a classy backdoor however are reasonably making an attempt to brute-force units with weak and simply guessable passwords.

Hikvision Digicam Vulnerability Exploited

The core of the difficulty lies in a vulnerability within the firmware of quite a few Hikvision digicam fashions that enables improper authentication. This flaw permits a distant, unauthenticated attacker to bypass safety measures and escalate their privileges, successfully gaining management over the system.

By sending a specifically crafted request, an attacker can obtain the digicam’s configuration file, which can comprise person credentials, and even change person passwords to lock out official house owners.

Whereas Hikvision has launched firmware patches to deal with this vulnerability, a whole lot of hundreds of units stay unpatched and uncovered on the web.

The issue is compounded by the truth that many different producers rebrand and promote Hikvision cameras underneath their very own names, making it troublesome for customers to determine if their units are affected.

A profitable exploit can have extreme penalties. Attackers cannot solely view dwell and recorded footage but in addition use the compromised digicam as a pivot level to launch additional assaults in opposition to the interior community.

The downloaded configuration information, although encrypted, use weak encryption with a static key, making it doable for attackers to decrypt them and harvest person credentials.

The present wave of assaults seems to be making the most of poor safety practices by customers. The usage of a easy password like “11” could also be because of the restricted person interface on some Hikvision DVRs, which frequently characteristic solely a numeric on-screen keyboard, making it cumbersome to enter advanced alphanumeric passwords.

Whereas inserting credentials in a URL is discouraged because of the danger of them being logged, it’s a handy characteristic that enables for creating direct login hyperlinks.

To mitigate the danger, house owners of Hikvision cameras are strongly suggested to replace their units’ firmware to the most recent model. It’s also essential to make use of robust, distinctive passwords and to keep away from exposing the digicam’s administration interface on to the web.

If distant entry is important, it needs to be carried out via a safe VPN connection.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Access, Camera, Exploiting, Hackers, Hikvision, Information, Sensitive, Vulnerability

Post navigation

Previous Post: BMC Firmware Vulnerabilities Allow Attackers to Bypass Signature Verification Features
Next Post: Cisco Warns of Actively Exploited SNMP Vulnerability Allowing RCE or DoS in IOS Software

Related Posts

Apache Tomcat Vulnerabilities Let Attackers Bypass Authentication & Trigger DoS Attacks Cyber Security News
Web DDoS, App Exploitation Attacks Saw a Huge Surge in First Half of 2025 Cyber Security News
Windows Task Scheduler Vulnerability Let Attackers Escalate Privileges Cyber Security News
Threat Actors Leverage Zoho WorkDrive Folder to Deliver Obfuscated PureRAT Malware Cyber Security News
Microsoft Removes PowerShell 2.0  from Windows To Clean up Legacy Code Cyber Security News
Hackers Using PUP Advertisements to Silently Drop Windows Malware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News