Back to Intelligence

Active Exploitation Detected: CISA Flags Critical Hikvision and Rockwell Flaws

SA
Security Arsenal Team
March 13, 2026
4 min read

Active Exploitation Detected: CISA Flags Critical Hikvision and Rockwell Flaws

Introduction

The threat landscape shifted significantly this week as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) sounded the alarm on two critical security flaws. These vulnerabilities, impacting ubiquitous Hikvision IP cameras and Rockwell Automation industrial systems, have been added to the Known Exploited Vulnerabilities (KEV) catalog. This designation is not merely a warning—it is confirmation that threat actors are actively scanning for and exploiting these bugs in the wild. For organizations managing Operational Technology (OT) or physical security infrastructure, the window for remediation is closing rapidly.

Deep Dive: CVE-2017-7921 and the OT Threat

The most notable addition is CVE-2017-7921, affecting Hikvision IP Cameras. Despite being assigned in 2017, this flaw remains a potent weapon in attacker arsenals, scoring a severe CVSS 9.8.

Technical Analysis

CVE-2017-7921 is an improper authentication vulnerability stemming from a buffer overflow in the camera's web server handling RTSP (Real-Time Streaming Protocol) requests. specifically, the vulnerability allows an unauthenticated attacker to send a specially crafted packet to the device. Because the authentication check is bypassed or improperly handled during the overflow, the attacker can execute arbitrary code with root privileges.

Why this matters now: Many organizations deploy "set it and forget it" IoT devices like security cameras. These devices often sit on neglected network segments, rarely receiving firmware updates. The addition to the KEV catalog suggests that attackers are leveraging automated tools to mass-scan the internet for these specific Hikvision endpoints, converting them into botnet nodes or using them as a pivot point to move laterally into the internal corporate network.

While details on the Rockwell Automation flaw were concurrently highlighted, the Hikvision vulnerability represents a broader risk due to the prevalence of these devices in perimeter security. The exploitation of such edge devices provides attackers with a foothold inside the physical perimeter, bypassing traditional firewall defenses.

Detection and Threat Hunting

Given the active exploitation status, Security Arsenal analysts recommend immediate hunting for indicators of compromise (IOC) associated with Hikvision cameras and unusual RTSP traffic.

Hunt for Suspicious RTSP and Camera Traffic

Use the following KQL query in Microsoft Sentinel to detect potential exploitation attempts against Hikvision devices or anomalous behavior from known camera IP ranges.

Script / Code
let HikvisionCameras = DeviceNetworkEvents
| where DeviceName contains "Hikvision" or DeviceCustomEntityType contains "Camera";
DeviceNetworkEvents
| where InitiatingProcessFileName !in ("nginx", "httpd", "avs") 
| where RemotePort == 554 or RemotePort == 8000
| where NetworkDirection == "Outbound"
| join kind=inner HikvisionCameras on DeviceId
| project Timestamp, DeviceName, SourceIP, RemoteIP, RemotePort, InitiatingProcessFileName
| summarize count() by DeviceName, RemoteIP, InitiatingProcessFileName
| where count_ > 10

Network Scanning for Exposure

Identify exposed Hikvision interfaces on your local network using a simple Bash script utilizing nmap. This helps inventory devices that may be vulnerable to CVE-2017-7921.

Script / Code
#!/bin/bash
SUBNET="192.168.1.0/24"
echo "Scanning for Hikvision devices on $SUBNET..."
# Scan for ports 80 (HTTP) and 554 (RTSP) commonly used by Hikvision
nmap -p 80,554,8000 --open -oG - $SUBNET | grep "Hikvision" 
echo "Scan complete. Please verify firmware versions on identified devices."

Mitigation Strategies

To defend against these active threats, organizations must move beyond simple awareness and take decisive action:

  1. Immediate Patching: Apply the firmware updates provided by Hikvision that address CVE-2017-7921 immediately. If the device is end-of-life (EOL) and no patch is available, the device must be replaced or isolated.

  2. Network Segmentation: Ensure IP cameras and OT devices are on an isolated VLAN (IoT/OT network). They should not have unrestricted internet access, nor should they be able to initiate connections to sensitive IT servers.

  3. Disable Unused Services: If RTSP is not required for business operations, disable it on the cameras. Similarly, disable Telnet if it is active, as it is often used for command and control after an initial exploit.

  4. Access Control Lists (ACL): Configure firewalls to restrict management access to camera web interfaces (ports 80/8080/443) strictly to admin subnets, blocking all other access attempts from the internet or untrusted networks.

Related Resources

Security Arsenal Alert Triage Automation AlertMonitor Platform Book a SOC Assessment platform Intel Hub

alert-fatiguetriagealertmonitorsoccisa-kevhikvisionot-securityvulnerability-management

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.