Finding Hikvision IP cameras and recorders on your network

, by Pearce Barry

Newly published security research from Watchful IP reveals an unauthenticated code execution vulnerability (assigned CVE-2021-36260) present in many Hikvision networked video devices. With a “critical” CVSS score of 9.8, this vulnerability affects a long list of Hikvision products (captured in this security advisory) and may have been around for at least the past five years. An attacker only needs access to an open http(s) server port (e.g. 80, 443) on a vulnerable device in order to obtain a root-level shell, giving them total control of the device and providing a foothold for further access into internal networks.

Hikvision has published a security advisory for affected devices, which encourages device owners to update to the latest patched firmware. In addition to the Hikvision brand, this vulnerability is presumed to affect devices OEM’d by Hikvision through other vendors and sold under different brand names.

Finding Hikvision IP cameras and recorders with Rumble

From the Asset Inventory, use the following pre-built query to locate Hikvision devices in your network:

protocols:http AND (vendor:hikvision OR hw:hikvision)
Find Hikvision devices

As always, any prebuilt queries we create are available from our Queries Library. Check out the library for other useful inventory queries.

Try Rumble

Don’t have Rumble and need help finding your Hikvision devices? Start your Rumble trial today.

Similar Content

May 12, 2022

Wrangling the May 2022 Patch Tuesday

Microsoft recently released security updates for over 70 vulnerabilities, including 3 zero-days and 7 critical vulnerabilities that affect a wide-range of their products and services. The list of patches covers an actively exploited zero-day vulnerability in the Windows …

Read More

May 5, 2022

Finding F5 BIG-IP instances

Technology vendor F5 recently published information on over 40 vulnerabilities, mostly affecting their BIG-IP line of products. While these vulnerabilities include a mix of types and severities, a particular authentication bypass vulnerability that can affect all BIG-IP …

Read More

April 29, 2022

Finding Netatalk instances

A critical vulnerability in the Netatalk open source file server software was found in some popular network attached storage (NAS) devices. Netatalk provides services for the deprecated AFP (Apple Filing Protocol, formerly known as Appletalk Filing Protocol), and runs on a …

Read More