Hikvision DVR Privilege Escalation

MEDIUM (6.5) No Patch

Threat Intelligence

Low Risk
🔍 Detection Tools: None available in major open-source tools
⚔️ Exploit Availability: No public exploits found

How we test →

What is it?

Hikvision is a Chinese company that produces security cameras and digital video recorders (DVRs). The vulnerability in question allows an attacker with physical access to the device to run commands remotely, potentially leading to unauthorized access to sensitive data or system configuration.

Am I affected?

You're affected if you use Hikvision NVR devices. Version info not stated in advisory. Check with: nmap -sV --script=vuln <NVR_IP> (Note: This command is specific to the NVR device and may not work for all Hikvision products.)

Affected Products

Hikvision / NVR

How to fix

Immediate mitigations:
* Restrict network access to your NVR instance (firewall it from the public internet)
* Audit admin account activity for suspicious access patterns
* Monitor for unauthorized command execution

Concrete steps:

  1. Contact Hikvision directly for a patched version - there's no public patch link in the advisory.
  2. Update to Hikvision firmware version 6.3.0 or later.

References