Hikvision Default Password Hacking

By John Honovich, Published Mar 03, 2015, 12:00am EST

What was once just warnings and consumer concerns has exploded into a major problem for Hikvision.

A Chinese province's Hikvision devices have been hacked.

In this note, we examine what happened, what Hikvision says they are doing about this and what this means for the mega-manufacturer.

Update September 2015. Hikvision has suffered another major hack.

Hikvision Historical Security Problems

As background, Hikvision had already been hit with a number of security concerns / issues over the past few years. The most infamous was Wired's article on Hikvision: HACKERS TURN SECURITY CAMERA DVRS INTO WORST BITCOIN MINERS EVER. In addition, there was a buffer overflow vulnerability found later in 2014. Even more basically, since Hikvision historically did not force users to change default passwords, and since there are so many Hikvision products out there, Hikvision made itself an obvious target for even the least sophisticated hackers.

The Chinese Province Hack

Given the historical problems, what is important here is that this incident is hitting a government organization, where information security is critical.

The province is Jiangsu, on the East coast of China, with ~80 million people.

In a press release only posted on Hikvision's Chinese site (see google translation), Hikvision admits that their products were hacked inside the Jiangsu Province Internet Emergency Center. Hikvision claims that this was due to the use of weak passwords / default passwords. We cannot confirm that as we have no connection to the Jiangsu government.

Join IPVM Newsletter?

IPVM is the #1 authority in video surveillance news, in-depth tests, and training courses. Get emails, once a day, Monday to Friday.

However it happened, the fact that government video surveillance equipment was hacked is a major problem. Indeed, this is even worse given the Chinese government's recent efforts to restrict foreign products that might expose them to hacking / attacks.

Hikvision's Response

In response, Hikvision USA Outlines Updates to Surveillance Products report has been released.

It summarizes steps they have already done in the past year and discloses a new release scheduled for later this month (5.3.0).

[[Note: This firmware has been released. See our full test of it here.]]

Key changes in this upcoming release include:

  • Forcing change of the default password (an obvious step and a key risk otherwise)
  • Disabling telnet access (telnet is considered quite vulnerable)
  • Lockouts after 5 incorrect login attempts (helpful to stop brute force attempts)

The Impact

Hikvision's stock dropped 7.5% in the first day of trading post the full disclosure (trading was actually halted Monday). In percentages terms, that is not huge but at their size, it is a drop of more than $1 billion USD in value. On the second day, the stock price rose slightly, indicating that the market does not view this as a major risk.

Update: June 25, 2015: Less than 3 months later, Hikvision's stock price is up more than 50% since the hacking announcement, showing that the market does not really care about this.

Since Hikvision is partially owned by the Chinese government and has deep connections, we doubt that this will be a fatal issue for Hikvision domestically. On the other hand, it is clearly a black eye for Hikvision and something that was hotly discussed inside of China.

In North America and Europe, we think the impact will be more severe. Rival manufacturers have already been hammering Hikvision as being 'spamware'. This will simply confirm it. On the lower end of the market, where Hikvision is most commonly used, outside of China, we suspect most will not care strongly as information security tends not to be a priority compared to price. However, as Hikvision tries to expand into the mid and high end markets, we think this will cause significant resistance, making it easy for rivals to declare, "Sure, you can buy Hikvision for half the price but with Axis you won't get hacked."

Hikvision Integrators / Users / OEMs

If you are a Hikvision integrator, user or OEM, you better very carefully review your deployed products and absolutely ensure that everything is upgraded immediately. Hikvision firmware upgrades are available here.

After a hack of this magnitude, it is going to be extremely hard to explain how you allowed your equipment to be hacked. And Hikvision products deployed before a year ago (and not upgraded) have many very basic / simple vulnerabilities. It is hard for us to tell if the upgrades solve every possible risk, but it is obvious that the older versions are significantly risk prone.


17 reports cite this report:

US Embassy Requires Hikvision Cameras on Aug 29, 2016
The US Embassy in Kabul Afghanistan has required only Hikvision cameras in a...
ADI Refuses to Fix Their OEM'd Hikvision Security Risks [Solved] on Mar 09, 2016
More than a year after massive hacks against Hikvision was disclosed; More...
Arecont and Bosch - Default Security Risk on Dec 14, 2015
Default passwords are a major security risk, enabling hackers around the...
Axis Cybersecurity Hardening Guide Examined on Nov 19, 2015
In most IT areas, 'hardening' guides are commonplace, providing best...
Hikvision Hires Pelco / G4S Exec Sam Belbina on Nov 10, 2015
Hikvision gets another major industry executive. He was most recently the...
Winners Losers Fall 2015 on Oct 12, 2015
There's a lot of losing right now, unfortunately. The industry is moving...
Dahua Finally Has A US Distributor on Oct 08, 2015
Finally. Billion dollar Dahua is the 'smaller' of the two mega Chinese...
Warning: ADI and Tri-Ed Video Products Major Security Risk on Sep 22, 2015
Recently, ADI and Tri-Ed both started OEMing Hikvision products. Reference -...
Hikvision Trojan Mobile App on Sep 22, 2015
With a vengeance. The last time, the industry mostly shook it off. This...
Anixter/Tri-Ed Northern Video Tested on Sep 18, 2015
ADI is an IP video manufacturer now (see IPVM's ADI W Box test results). And...
ADI's W Box Camera / NVR Gen 1 (Hikvision) Tested on Jul 22, 2015
ADI moves hundreds of millions of dollars worth video surveillance equipment...
Pros and Cons - Automating Firmware Updates on Jul 01, 2015
Firmware and software updates are one of the most tedious tasks in...
Hikvision Anti Hacking Firmware Tested on Jun 03, 2015
Hikvision has had historic hacking problems, with DVRs turned into Bitcoin...
Hikvision Hires Ex-Samsung / Panasonic Exec on May 18, 2015
Hikvision's expansion continues, with the mega Chinese manufacturer now...
Axis Cuts Prices 2015 on Mar 09, 2015
Axis has cut prices on a number of their most popular markets.  In this...
NMAPing IP Cameras on Mar 05, 2015
The Hikvision hack has increased security concerns. Indeed, most users do...
Avigilon 2014 Financials Disappoint Investors on Mar 04, 2015
Hikvision admits their equipment got hacked in a large government deployment...
Comments (46) : Subscribers only. Login. or Join.
Loading Related Reports