Hikvision Access Control and Intercom Products
Hikvision access control terminals and intercom systems contain vulnerabilities in session handling (CWE-384) and access control logic (CWE-284) that allow attackers on the local network to hijack user sessions and gain operator permissions, or to modify device network configuration by sending crafted packets. Affected product lines include DS-K1T804AXX, DS-K1T341AXX, DS-K1T671XXX, DS-K1T343XXX, DS-K1T341C, DS-K1T320XXX, DS-KH63, DS-KH85, DS-KH62, DS-KH9310-WTE1(B), and DS-KH9510-WTE1(B) devices with various firmware versions up to early 2023.
- Local network access to the vulnerable device or its management interface
- Device must be connected to the same network segment as attacker
- For session hijacking: an active user session must exist on the device
- No valid user credentials required for network configuration modification variant
Patching may require device reboot — plan for process interruption
/api/v1/advisories/31c4b464-aea7-4465-8802-de5e11a6f6bfGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.