Download fixed firmware here: Firmware Download

    Precondition:

    The attacker has access to the device network or the device has direct interface with the internet

    Attack step:

    Send a specially crafted message.

    Obtaining fixed firmware:

    Users should download the updated firmware to guard against this potential vulnerability. It is available on the Hikvision official website: Firmware download

    Source of vulnerability information:

    This vulnerability is reported to HSRC by UK security researcher Watchful IP.

    Contact Us:

    Should you have a security problem or concern, please contact Hikvision Security Response Center at hsrc@hikvision.com.

     

    This website uses cookies to store info on your device. Cookies help our website work normally and show us how we can improve your user experience.
    By continuing to browse the site you are agreeing to our cookie policy and privacy policy.

    Contact