CVE-2017-7921Friday, March 6, 2026

Hikvision IP Camera Authentication Bypass

An authentication bypass vulnerability in Hikvision IP cameras (various models) allows an attacker to bypass device authentication by using a backdoor URL, potentially exposing sensitive camera feeds and administrative functions.

Not KEV Listed✓ Fix Available
Hikvision IP Camera Authentication Bypass
💡

This section explains the vulnerability in everyday language, so anyone can understand the risk and impact.

This vulnerability affects many Hikvision security cameras that can connect to the internet. The cameras have a hidden 'backdoor' that lets anyone access the camera's video feed and settings without needing a password. It's like having a security door with a secret entrance that bypasses all the locks.

This is particularly serious because these cameras are often used in homes and businesses for security purposes. Anyone who knows about this vulnerability can potentially watch the camera's video feed, change its settings, or use it as a way to get into the network it's connected to.

Affected Products

1affected product identified
ProductVendorVersionPatched
>IP CamerasHikvisionMultiple models pre-2017Various (model-dependent)
🔧

Remediation

Fix Available

1. Update camera firmware to the latest version from Hikvision

2. Change default passwords

3. Implement network segmentation to restrict camera access

4. Use a firewall to control access to camera ports

5. Disable direct internet exposure of cameras where possible

🔗

Sources & References

CVSS Score
9.8
CriticalCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Vector (v3.0)
Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
ScopeUnchanged
ConfidentialityHigh
IntegrityHigh
AvailabilityHigh
Quick Info
CVE IDCVE-2017-7921
Severitycritical
FixAvailable
KEVNot Listed
PublishedMar 6, 2026