HikVision Wi-Fi IP cameras come with a default SSID "davinci", with a setting of no WiFi encryption or authentication. Depending on the firmware version, there is no configuration option within the camera to turn off Wi-Fi. If a camera is deployed via wired ethernet, then the WiFi settings won't be adjusted, and a rogue AP with the SSID "davinci" can be associated to the camera to provide a new attack vector via WiFi to a wired network camera. Tested on firmware versions 5.3.0, 5.4.0, and 5.4.5 and model number DS-2CD2432F-IW.
87464d23582bc4da4d3894ca7fc74bea
Hikvision IP Camera versions 5.2.0 through 5.3.9 (builds 140721 up until 170109) suffer from an access control bypass vulnerability.
c61631feb0c586eb225dc046e312c1e9
Hikvision IP Cameras suffers from multiple access bypass vulnerabilities.
6fc12ebc93196ea83a1dbcc6864fa795
Hikvision Digital Video Recorder versions LV-D2104CS, DS-7316HFI-ST, DS-7216HVI-SV/A, DS-7208HVI-SH, and DS-7204HVI-SH suffer from a cross site request forgery vulnerability.
ca3b7aec5d618bd60ac4bc8866bce554
Hikvision DS-7108HWI-SH suffers from XML injection and abuse control vulnerabilities.
640f79771f41fb706f57dc4b44e0ca8e
Hikvision DS-2CD2012-I suffers from XML injection and abuse control vulnerabilities.
0b259f26e1378bd1f979911681b41049
Hikvision DS-7204HWI-SH suffers from abuse of functionality and brute force vulnerabilities.
00816e4ccf826d821b8eb465e739dfd4
This Metasploit module exploits a buffer overflow in the RTSP request parsing code of Hikvision DVR appliances. The Hikvision DVR devices record video feeds of surveillance cameras and offer remote administration and playback of recorded footage. The vulnerability is present in several models / firmware versions but due to the available test device this module only supports the DS-7204 model.
8b5fd312a339e0a4af823684bf4c92bf
Core Security Technologies Advisory - Hikvision IP Cameras suffer from buffer overflow, authentication bypass, hard-coded credential, and privilege escalation vulnerabilities.
411332e5cd4f468d6326f947784eaaa6