当サイトでは、ウェブサイト機能向上に必要なCookie(クッキー)を使用しています。お客様に弊社ウェブサイトを快適にご利用いただくために、新たなCookieの使用をご理解いただけると幸いです。詳しい情報は、クッキーポリシーでご確認ください。
Product name |
Affected version(s) |
DS-2CVxxx1 |
Versions which Build time before 210625 |
HWI-xxxx |
|
IPC-xxxx |
|
DS-2CD1xx1 |
|
DS-2CD1x23G0 DS-2CD1x23G0E(C) |
|
DS-2CD1xx7G0 |
|
DS-2CD2xx6G2 DS-2CD2xx6G2(C) DS-2CD2xx7G2 DS-2CD2xx7G2(C) |
|
DS-2CD2x21G0 DS-2CD2x21G0(C) DS-2CD2x21G1 DS-2CD2x21G1(C) |
|
DS-2CD2xx3G2 |
|
DS-2CD3xx6G2 DS-2CD3xx6G2(C) |
|
DS-2CD3xx7G0E |
|
DS-2CD3x21G0 DS-2CD3x21G0(C) |
|
DS-2CD3xx3G2 |
|
DS-2CD4xx0 |
|
DS-2XE62x2F(D) |
|
DS-2CD8Cx6G0 |
|
(i)DS-2DExxxx |
|
(i)DS-2PTxxxx |
|
(i)DS-2SE7xxxx |
|
DS-2DYHxxxx |
|
DS-DY9xxxx |
|
PTZ-Nxxxx |
|
HWP-Nxxxx |
|
DS-2DF5xxxx |
|
iDS-2PT9xxxx |
|
iDS-2SK7xxxx |
|
iDS-2SR8xxxx |
|
iDS-2VSxxxx |
|
DS-2TBxxx |
Versions which Build time before 210702 |
DS-2TD1xxx-xx |
|
DS-2TD41xx-xx/Wx |
|
DS-76xxNI-K1xx(C) |
V4.30.210 Build201224 - V4.31.000 Build210511 |
DS-71xxNI-Q1xx(C) |
V4.30.300 Build210221 - V4.31.100 Build210511 |
SN No.: HSRC-202109-01
Edit: Hikvision Security Response Center (HSRC)
Initial release date: 2021-09-19
Summary:
A command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.
CVE ID:
CVE-2021-36260
Scoring:
CVSS v3 is adopted in this vulnerability scoring(http://www.first.org/cvss/specification-document)
Base score: 9.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H)
Temporal score: 8.8 (E:P/RL:O/RC:C)
Affected versions and resolved version:
Information of affected versions and resolved versions:
Precondition:
The attacker has access to the device network or the device has direct interface with the internet
Attack step:
Send a specially crafted message.
Obtaining fixed firmware:
Users should download the updated firmware to guard against this potential vulnerability. It is available on the Hikvision official website: Firmware download
Source of vulnerability information:
This vulnerability is reported to HSRC by UK security researcher Watchful IP.
お問い合わせ
Should you have a security problem or concern, please contact Hikvision Security Response Center at hsrc@hikvision.com.
2021-09-19 V1.0 INITIAL
2021-09-23 V1.1 UPDATED: Updated Affected Versions
2021-09-24 V1.2 UPDATED: Updated Affected Versions
当サイトでは、ウェブサイト機能向上に必要なCookie(クッキー)を使用しています。お客様に弊社ウェブサイトを快適にご利用いただくために、新たなCookieの使用をご理解いただけると幸いです。詳しい情報は、クッキーポリシーでご確認ください。