Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Critical Security Flaws in Hikvision and Rockwell Products

Critical Security Flaws in Hikvision and Rockwell Products

Posted on March 6, 2026 By CWS

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has recently identified two critical vulnerabilities affecting Hikvision and Rockwell Automation products, adding them to its Known Exploited Vulnerabilities (KEV) catalog. These flaws have been actively exploited, prompting heightened security measures.

Details of the Identified Vulnerabilities

The vulnerabilities, both carrying a CVSS score of 9.8, pose serious security risks. The first, CVE-2017-7921, is an improper authentication issue in various Hikvision products, potentially allowing attackers to escalate privileges and access sensitive data. The second, CVE-2021-22681, affects multiple Rockwell Automation systems, including Studio 5000 Logix Designer, RSLogix 5000, and Logix Controllers. This flaw could enable unauthorized users to bypass verification, authenticate with the systems, and alter configurations or code.

Impact and Exploitation

The inclusion of CVE-2017-7921 in the KEV catalog follows over four months of exploit attempts against vulnerable Hikvision cameras, as reported by the SANS Internet Storm Center. While no public reports have detailed attacks using CVE-2021-22681, the threat remains significant. Federal Civilian Executive Branch (FCEB) agencies are urged to update their systems by March 26, 2026, following Binding Operational Directive (BOD) 22-01.

Recommendations from CISA

CISA emphasizes the urgency of addressing these vulnerabilities, highlighting that they are frequent targets for cyber actors and pose considerable risks to federal operations. While BOD 22-01 is specific to FCEB agencies, CISA strongly advises all organizations to incorporate the remediation of KEV catalog vulnerabilities into their vulnerability management processes to minimize exposure to cyber threats.

In conclusion, staying ahead of potential cyber threats involves timely updates and proactive vulnerability management. Organizations are encouraged to prioritize these actions to safeguard their systems and data from malicious exploitation.

The Hacker News Tags:BOD 22-01, CISA, CVE-2017-7921, CVE-2021-22681, cyber threats, Cybersecurity, FCEB, Hikvision, KEV catalog, network security, Rockwell Automation, security patches, Vulnerabilities

Post navigation

Previous Post: China-Linked Cyber Attacks Target South American Telecoms
Next Post: Iranian Cyber Group Targets US Organizations Amid Tensions

Related Posts

Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps Researchers Expose PWA JavaScript Attack That Redirects Users to Adult Scam Apps The Hacker News
CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog CISA Adds Erlang SSH and Roundcube Flaws to Known Exploited Vulnerabilities Catalog The Hacker News
Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection Linux Malware Delivered via Malicious RAR Filenames Evades Antivirus Detection The Hacker News
ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts ServiceNow AI Agents Can Be Tricked Into Acting Against Each Other via Second-Order Prompts The Hacker News
New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper New MacSync macOS Stealer Uses Signed App to Bypass Apple Gatekeeper The Hacker News
Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate Credential Theft and Remote Access Surge as AllaKore, PureRAT, and Hijack Loader Proliferate The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • FBI Probes Cyber Incident on Sensitive Surveillance System
  • Advanced Linux Rootkits Exploit eBPF and io_uring
  • AI Model Identifies Significant Firefox Vulnerabilities
  • FBI Probes Breach in Wiretap and Surveillance Systems
  • RMM Tools: Vital for IT but Increasingly Misused by Hackers

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News