Dear Valued Partner:
Hikvision issued the Security Notification on our website on September 19th regarding a critical Command Injection Vulnerability in the webserver of some Hikvision products. The updated firmware that fixes this problem has been available on our website. If you cannot find your model from link above, please download here. The list of products affected by the vulnerability can be accessed through this Security Notification.
We recognize that many of our partners may have installed Hikvision equipment that is affected by this vulnerability, and we strongly encourage that you work with your customers to ensure proper cyber hygiene and install the updated firmware.
With this vulnerability we wanted to provide you the details and timeline to reassure you that Hikvision’s commitment to cybersecurity is strong. In June 2021, Hikvision was contacted by a security researcher, named Watchful IP, who reported a potential vulnerability in a Hikvision camera. Once we confirmed receipt of this report, Hikvision worked directly with the researcher to patch and verify the successful mitigation of the reported vulnerability, following the standard Coordinated Vulnerability Disclosure process.
In addition, Hikvision is a CVE Numbering Authority (CNA) and has committed to continuing to work with third-party white-hat hackers and security researchers, to find, patch, disclose and release updates to products in a timely manner that is commensurate with our CVE CNA partner companies' vulnerability management teams.
Hikvision strictly complies with the applicable laws and regulations in all countries and regions where we operate and our efforts to ensure the security of our products go beyond what is mandated.
Please do not hesitate to contact our team with any questions or concerns.