Security for everyone

CVE-2017-7921 Scanner

Detects 'Authentication Bypass' vulnerability in Various Hikvision Devices affects v. Hikvision DS-2CD2xx2F-I Series V5.2.0 build 140721 to V5.4.0 build 160530, DS-2CD2xx0F-I Series V5.2.0 build 140721 to V5.4.0 Build 160401, DS-2CD2xx2FWD Series V5.3.1 build 150410 to V5.4.4 Build 161125, DS-2CD4x2xFWD Series V5.2.0 build 140721 to V5.4.0 Build 160414, DS-2CD4xx5 Series V5.2.0 build 140721 to V5.4.0 Build 160421, DS-2DFx Series V5.2.0 build 140805 to V5.4.5 Build 160928, and DS-2CD63xx Series V5.0.9 build 140305 to V5.3.5 Build 160106 devices.

SCAN NOW

Short Info


Level

Critical

Type

Single Scan

Can be used by

Asset Owner

Estimated Time

15 sec

Scan only one

Url

Parent Category

CVE-2017-7921 Scanner Detail

Hikvision is a global leader in innovative security systems and solutions. Their extensive range of devices includes video surveillance cameras, access control devices, and intrusion detection systems. These devices are used in a diverse range of settings, including residential, commercial, and industrial environments. Hikvision devices are designed to provide reliable and high-quality security solutions that keep people and property safe. 

One of the security vulnerabilities that has been detected in Hikvision devices is CVE-2017-7921. This vulnerability was found in several Hikvision products, including the DS-2CD2xx2F-I Series, DS-2CD2xx0F-I Series, DS-2CD2xx2FWD Series, DS-2CD4x2xFWD Series, DS-2CD4xx5 Series, DS-2DFx Series, and DS-2CD63xx Series. The vulnerability relates to an improper authentication issue, which allows an attacker to escalate their privileges on the system and gain access to sensitive information. 

If CVE-2017-7921 is successfully exploited, it can lead to a number of serious consequences. An attacker may be able to gain unauthorized access to sensitive information, including personal data, financial information, and intellectual property. The attacker may also be able to tamper with or destroy data, disrupt normal system operations, or use the device to launch attacks against other systems. In some cases, a successful attack may go unnoticed, allowing the attacker to continue their activities undetected. 

Thanks to the pro features of the securityforeveryone.com platform, it is easy for readers to learn about potential vulnerabilities in their digital assets. By staying informed and taking appropriate precautions, users can protect their systems and data from unauthorized access and potential attacks.

 

REFERENCES

cyber security services for everyone one. Free security tools, continuous vulnerability scanning and many more.
Try it yourself,
control security posture