CVE-2021-36260

9.8 CRITICAL

📋 TL;DR

CVE-2021-36260 is a critical command injection vulnerability in Hikvision web servers that allows unauthenticated attackers to execute arbitrary commands on affected devices. This affects various Hikvision surveillance products including IP cameras, NVRs, and access control systems. Organizations using vulnerable Hikvision devices are at risk of complete system compromise.

💻 Affected Systems

Products:
  • Hikvision IP cameras
  • Hikvision NVRs
  • Hikvision access control systems
  • Various Hikvision surveillance products
Versions: Multiple firmware versions prior to September 2021 patches
Operating Systems: Embedded Linux systems in Hikvision devices
Default Config Vulnerable: ⚠️ Yes
Notes: Affects devices with web interface enabled. Exact product list varies; check Hikvision advisory for specific models.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system takeover, installation of persistent backdoors, lateral movement to internal networks, data exfiltration, and device bricking.

🟠

Likely Case

Unauthenticated remote code execution leading to camera manipulation, surveillance footage theft, credential harvesting, and botnet recruitment.

🟢

If Mitigated

Limited impact if devices are isolated in separate VLANs with strict network segmentation and egress filtering.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet without authentication, making exposed devices immediate targets.
🏢 Internal Only: HIGH - Even internally, the vulnerability requires no authentication and can be exploited by any network-accessible attacker.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Multiple public exploit scripts available. Actively exploited in the wild since 2021. Exploitation requires sending specially crafted HTTP requests to vulnerable endpoints.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Firmware updates released September 2021 and later

Vendor Advisory: https://www.hikvision.com/en/support/cybersecurity/security-advisory/security-notification-command-injection-vulnerability-in-some-hikvision-products/

Restart Required: Yes

Instructions:

1. Identify affected Hikvision devices. 2. Download latest firmware from Hikvision portal. 3. Backup configuration. 4. Apply firmware update via web interface. 5. Reboot device. 6. Verify update successful.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate Hikvision devices in separate VLAN with strict firewall rules

Web Interface Restriction

linux

Block external access to web interface via firewall rules

iptables -A INPUT -p tcp --dport 80 -j DROP
iptables -A INPUT -p tcp --dport 443 -j DROP

🧯 If You Can't Patch

  • Immediately isolate affected devices from internet and critical internal networks
  • Implement strict network access controls allowing only necessary traffic to/from devices

🔍 How to Verify

Check if Vulnerable:

Check device firmware version against Hikvision advisory. Test with nmap scripts or Metasploit module.

Check Version:

Check web interface System Information page or use SNMP queries if enabled

Verify Fix Applied:

Verify firmware version is patched (post-September 2021). Test with known exploit scripts to confirm failure.

📡 Detection & Monitoring

Log Indicators:

  • Unusual HTTP POST requests to device management endpoints
  • Command execution patterns in system logs
  • Failed authentication attempts followed by successful command execution

Network Indicators:

  • HTTP requests containing command injection payloads to /SDK/webLanguage
  • Unusual outbound connections from surveillance devices
  • Traffic to known C2 servers from IoT devices

SIEM Query:

source="hikvision*" AND (url="*/SDK/webLanguage*" OR http_method="POST" AND uri_contains("$" OR "|" OR ";"))

🔗 References

📤 Share & Export