Hackers Exploit Hikvision Camera Flaw to Steal Sensitive Data


Security researchers have observed renewed exploit campaigns targeting an eight-year-old backdoor in Hikvision cameras to harvest configuration files, user lists, and snapshots.

Attackers automate scans across IP ranges, appending a base64-encoded “auth” parameter to management URLs.

When decoded, the string commonly reveals “admin:11,” enabling unauthorized access. Organizations relying on older camera firmware are at heightened risk of data leakage.

Vulnerability Overview

First assigned CVE-2017-7921, the flaw stems from a hidden endpoint in Hikvision IP cameras that accepts credentials via a URL parameter, as reported by ISC Sans.

CVE IDCVSS v3.1 Base ScoreSeverityAffected Products
CVE-2017-79219.8CriticalMultiple Hikvision IP camera and DVR models

Instead of entering login details through the web interface, attackers issue GET requests such as:

GET /System/deviceInfo?auth=YWRtaW46MTEK

Here, “YWRtaW46MTEK” decodes to “admin:11.” Despite Hikvision’s sparse advisory in 2017, many administrators never discovered the exposed URLs.

Cameras and DVRs with only numeric on-screen keypads often still use trivial PINs, making brute-force attacks trivial.

On September 23, 2025, honeypot logs recorded thousands of exploit attempts across multiple endpoints.

Attack scripts save any returned data configuration files, user credentials, Wi-Fi keys for lateral network intrusion or resale.

Below is a summary of the most targeted URLs and report counts since initial discovery:

Endpoint URLFirst ReportMost Recent ReportTotal Exploit Attempts
/System/configurationFile?auth=YWRtaW46MTEK2018-08-182025-09-236 720
/Security/users?auth=YWRtaW46MTEK2017-12-142025-09-232 293
/system/deviceInfo?auth=YWRtaW46MTEK2021-03-092025-09-232 002
/onvif-http/snapshot?auth=YWRtaW46MTEK2018-09-092025-09-23445
/security/users/1?auth=YWRtaW46MTEK2020-09-252023-02-04727
/Streaming/channels/1/picture/?auth=YWRtaW46MTEKYOBA2017-10-062017-10-066
/ISAPI/Security/users?auth=YWRtaW46MTEK2025-04-092025-04-292

Mitigation Strategies

  • Firmware Updates: Apply the latest patches from Hikvision to remove hard-coded backdoors and enforce robust password rules.
  • Network Segmentation: Isolate cameras on VLANs and restrict access with firewall rules.
  • Strong Credentials: Replace default PINs with complex, alphanumeric passwords and disable URL-based logins.
  • Log Monitoring: Watch for unexpected 200 OK responses to management URLs. Any “auth=” parameter in access logs warrants immediate investigation.
  • Remote Access Controls: Disable or limit remote administration, and prefer HTTPS with digest or token-based authentication.

By promptly updating devices and tightening network controls, organizations can block attackers from exploiting CVE-2017-7921 and safeguard sensitive camera configurations.

Follow us on Google News, LinkedIn, and X to Get Instant Updates and Set GBH as a Preferred Source in Google.



Source link