PatchSiren

Hikvision CVE debriefs

These pages are published after PatchSiren validates generated defensive summaries against stored public CVE and source evidence.

HIGH Hikvision CVE published 2026-05-09

CVE-2026-3828

CVE-2026-3828 is an authenticated remote command execution vulnerability affecting some Hikvision switch products that have been discontinued since December 2023. According to the vendor advisory and NVD entry, a valid user can send crafted packets with malicious commands and obtain arbitrary command execution on affected devices. Because the issue impacts network-facing infrastructure and can affect conf [truncated]

MEDIUM Hikvision CVE published 2026-05-09

CVE-2026-1749

CVE-2026-1749 is an access control vulnerability in some HikCentral Professional versions that may let an unauthenticated user obtain admin permission. NVD lists the issue with a CVSS 3.1 vector of AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N, indicating network reachability and potentially high confidentiality impact if the flaw is reachable in a deployed environment.

Known exploited Hikvision CVE published 2026-03-05

CVE-2017-7921

CVE-2017-7921 is a Hikvision improper authentication vulnerability affecting multiple products and is listed in CISA’s Known Exploited Vulnerabilities catalog. Because CISA has added it to KEV, defenders should treat it as an actively exploited issue and prioritize vendor-guided mitigation or replacement where mitigation is not available. The supplied source set points readers to Hikvision’s special notic [truncated]