Summary: Hikvision has issued firmware updates to fix a security vulnerability that could expose users’ Dynamic DNS credentials, affecting numerous network camera models. The flaw allowed sensitive information to be transmitted in cleartext, making it susceptible to interception by attackers.
Threat Actor: Unknown | unknown
Victim: Hikvision Users | Hikvision users
Key Point :
- Older firmware versions transmitted Dynamic DNS credentials in cleartext, making them vulnerable to interception.
- Attackers could steal credentials, disrupt communication, or launch further attacks using compromised accounts.
- Hikvision has released updated firmware to enforce HTTPS communication, mitigating the vulnerability.

Hikvision, a leading provider of network cameras and surveillance systems, has released firmware updates to address a security vulnerability that could expose usersβ Dynamic DNS credentials. The vulnerability affects a wide range of Hikvision network camera models and could allow attackers to intercept sensitive information or disrupt communication between the camera and the Dynamic DNS service.
The Vulnerability:
Older firmware versions of Hikvision network cameras only supported HTTP communication with Dynamic DNS providers like DynDNS and NO-IP. This meant that usernames and passwords used to access these services were transmitted in cleartext, making them susceptible to interception by attackers.
Impact:
An attacker exploiting this vulnerability could:
- Steal Dynamic DNS Credentials: Capture usernames and passwords, potentially gaining unauthorized access to the userβs Dynamic DNS account.
- Disrupt Communication: Interfere with the cameraβs connection to the Dynamic DNS service, preventing remote access to the camera.
- Launch Further Attacks: Use the compromised Dynamic DNS account to redirect traffic or launch other malicious activities.
Affected Products:
A wide range of Hikvision network camera models are affected, including:
- DS-2CD1xxxG0, DS-2CD2xx1G0, DS-2CD3xx1G0, IPC-xxxxH (versions prior to V5.7.23 build241008)
- DS-2CD29xxG0 (versions prior to V5.7.21 build240814)
- DS-2CD1xxxG2, DS-2CD3xx1G2, HWI-xxxxHA, IPC-xxxxHA (versions prior to V5.8.4 build240613)
- DS-2CD2xxxG2, DS-2CD3xxxG2 (versions prior to V5.7.18 build240826)
- DS-2CD2xxxFWD (versions prior to V5.6.821 build240409)
Solution:
Hikvision has addressed this vulnerability by releasing updated firmware versions that enforce HTTPS communication with Dynamic DNS services. Users of affected cameras are strongly urged to update their firmware to the latest version as soon as possible.