Suffering Criticism, Hikvision Keeps Insecure Online Service Up [Now Down]

By: John Honovich, Published on Jan 03, 2017

Hikvision suffered severe criticisms for its abrupt plan to discontinue its Hikvision Online service, with 3 core functions to be removed on Dec 30th.

However, all of those functionalities continue to run in 2017, including the security vulnerabilities, and Hikvision has no explanation of what will happen next.

Update January 5th, is now shut down. The site is up and one can login but when doing so, it just displays the discontinuation notice with no other options - e.g., no ability to manage devices or check status. In addition, new devices cannot be added, despite the notice saying that this could be done through February 16th.

Dec **** ***

*** **** *** ******** to ** *** *** for *** **** ************, and ****** ****** *** management ************. **** ** the *********** **** ********* China:

*** ******* *** **** Hikvision ***:

******, **** ** ***** notices ******** ** ** displayed, ** **, ** Hikvision's *****.

Running *****

*** *** ************ ********* to **** *** **** logged **, ****** ****** and ********** ******* ****** as ***** *****:

No ***********

********* *** *** ******** any ****** *********** *** response ** ****'* *******. Indeed, **** ******* ** to *** *******, *** interstitial ********* ** *** Dec **** ** *** date ** *** ***** 3 *********, *** **** immediately ******* *** **** to ***** ****** *********.

Fix *** ******** ***************

** ********* ******* ** reverse ***** ******** **** and **** *** ****** fully **********, **** ** understandable ***** *** *********** and ********** ********** **** have *****.

*******, ** ********* ** serious ***** ***** ***** security ********* ****** *** want ** ****** ********** concern **** ***** **** track ******, *** ******** vulnerabilities ** ********* ****** must ** *****.

*** *******, *** ****** does *** ******* ***** at ***. **********, ***** OEM *** ******** **** the **** ***** **** their **** ******* *** they ***** ** ******* after **** ****** ** out. *********, ******* ***** self-proclaimed *,*** '*********' *** not **** **** **** LTS's *********.

********, *** ****** ***** suffers **** ** *********** flaw (***** ******** ****) ***** *** ****** IP ******* ** ***** device ********* ** *** service *** ****** ** discovered ** ********* ****** the *********** *** ********* they ******, ********** *** probability ***** ******* **** be ****** ** ******.

Communication ******** ********

**** ** *** ***** in * ****** ** communication ******.

  • *****, ********* ***** ***** a ****** ** *************** when ******* **. ** was * **** ***** when ********* *** ********* it, *** **** ********* changed *** ********* *** significant.
  • ******, ********* *** ******* said **** *** ****-**** was ***** ************ *** it *** *** ***** 5 **** ***** **** Hikvision ********** ******** **** they ***** ***
  • ***, ********* ****** ******* as **, ******** ** Hikvision's ***** ******, **** unclarity ***** **** ***** next.

***** ********* ***** **** those *************** ********, ** it * **** ***** the ******* ***********. ***** they **** ** ************ yet ***** *** ******** vulnerabilities *******. ** ** an *********** ********* *** Hikvision ******* ** ********* continues ** ****** ****** and **** ***** **********.

Comments (15)

In new press releases, Hikvision has given new details on their new Hik-Connect platform. See the North America and Global releases. The releases are mainly the same, but:

  • The USA release is dated today, global is dated December 30th.
  • The USA release informs users that they may continue using their HiDDNS URLs for existing devices, not mentioned in the global release.
  • The USA release links to several how-to guides for creating accounts, adding devices, etc., on iVMS-4200 and iVMS-4500.

Both releases state that the new Hik-Connect app is coming in 4-7 days, awaiting App Store and Play Store approval:

The new Hik-Connect web interface looks like a stripped down EZVIZ device management page:

But there is no actual cloud access, either to settings or live/playback. Instead, clicking on the IP/Port No. opens the device's IP address. Port forwarding is still required. 

You can push UPnP/port settings to the device via settings, but this is the only configuration available.

We'll take a look at things again when the mobile app is released.

With all my due respect,

How many years it took IPVM to have "S" at the end of http?


We have had HTTPS support for login / billing / payment for many many years, since January 2009.

We added HTTPS for the rest of the site, e.g., reading articles, in 2016.

Hikvision still does not have HTTPS for anything on Hik Online, including logging in and managing device information for dealers / customers. 

They don't take credit cards like you do :)

They have a master database of hundreds of thousands or millions of devices that can easily be scraped / downloaded because of an ongoing enumeration vulnerability. If you do not mind, that is certainly your prerogative but surely many dealers do not want that exposed.

Was IPVM hacked before or after "S" :)

IPVM was not hacked. There was a leak in 2014. We changed how we handled information after that and there has not been a recurrence.

It took me a couple hours to migrate the systems we had (maybe 20) on this to no-ip, followed by deletion from the hikvision website. This was followed up with new ddns address and instructions to the customers.

This would be a better longterm plan since you can also run the no-ip client on other systems and/or routers/firewalls.  Cost is about a buck a year per host from a company whos core offering is secure supported ddns service.  Kind of a no brainer.

I tested no-ip and dyndns and chose no-ip because I could assign passwords to groups of hosts (using random password generator).  With dyndns, you could assign a long code-key but Hikvision would not accept this many characters in the password field.

To me, this is common sense to make this switch.  Just make sure you have a group allocation and system naming scheme before you do this.  I used a password generator with all characters 8 in length.  (username is "group":"siteusername").

I find it hard to believe that there is such commotion over a service offered for convenience (which no other vendors offered), but should have said "use at your own risk".  Now that I look back at it, it was pure laziness on our part not to use a reputable ddns source, especially with all the other systems and firewalls we have deployed (you should be using it on the router/firewall, anyway).


Isn't that what a corporation should do? Listen to its customers and react in kind? They made  a decision based on the data available. Data proved to be wrong. Reverse course. That we are so much talking about this means that this is a company to take even more seriously. Not only are they listening, they have the wherewithal to act swiftly upon our desires and perhaps needs. They should be commanded.

Now frankly, we have always made sure of disabling this "feature" and still do heavy firewalling on corporate networks. For the most part we block everything except what's necessary for video recording, camera management and other associated data.


This is somewhat similar to the path taken by Microsoft which for the longest time weren't listening... They are now making great products based on customer feedback (read criticism).. OTOH Apple is moving in a different direction...They removed the so-basic earphone jack from the iPhone and changed not much inthe Macbook except to add a RIDICULOUS touch bar . Meanwhile Micro$oft cannot keep up with the demand for the Ultimate Laptop:The Surface which is not a laptop but a tablet .... or is it a laptop :) Sorry to be OT


if anything this will add to Hikvision bottom-line and sales.

Not only are they listening, they have the wherewithal to act swiftly upon our desires and perhaps needs. They should be commanded.

Presuming they intend to keep it long term. But there is still no clarity.

I will definitely agree with you if they keep it and fix the security vulnerabilities and announce it publicly. Otherwise, it is just not clear what they are doing.

if anything this will add to Hikvision bottom-line and sales.

Mitigating this problem will definitely help reduce lost sales. However, the whole episode, starting with the move on Dec 8/9th, is definitely a negative to bottom-line and sales. 

I do agree that if they can resolve it well over the next month or two, it will repair things over time but I do not believe that this will ever be a net benefit to Hikvision (or any company that goes through an episode like this).



Again this is what leaders face everyday. Microsoft is the most hacked OS because it is the overwhelming leader.. Hik is criticized for good reasons among these that they're  the leader in the industry by a very large margin. The vulnerabilities are real but so are those from many of their competitors Axis especially another leader which faces less scrutiny at this point.

The entire field  of IP-based surveillance and security systems needs to take a deep breath and consider cybersecurity as part of what we do. Not a separate field to be handled-off casually to another party. We are whether we admit it or not responsible for the well being and correct behavior of the systems we put in place. While this creates a new level of responsibility and complexity it also will drive more revenues. The Internet Of Things is upon us. This new road will bring new threats. For us Integrator in IP Surveillance it is both an opportunity and a threat. I personally tend to see it as a much needed opportunity when prices of hardware is falling so precipitously. Hik is one small driver in this: The real culprit is Moore's Law. Silicon has been growing cheaper and better by the nanosecond... It wasn't 3 years ago that a 1080p was the TOL now 4 MP are <$200 with WDR....

Axis especially another leader which faces less scrutiny at this point.

I know you are aware of this but I want to emphasize that we were the only ones to cover the Axis critical security vulnerability and we covered it repeatedly, including tests, e.g.: Axis Critical Security VulnerabilityAxis Camera Hack TestedAxis Exploit Allows Changing Camera Root Password Confirmed, etc.

Things that I believe helped Axis:

  • Timing, it happened at the beginning of summer, when many people were on vacation
  • The difficulty of the vulnerability - it was very hard to find and took some skill / effort to exploit
  • Axis strong historical reputation

The other factor is Hikvision's government ownership. Certainly we played a major role in scrutinizing this but we did similarly with the Axis vulnerability. Some things catch on and some do not, depending on what integrator overall concerns and experiences are.

Update January 5th, is now shut down. The site is up and one can login but when doing so, it just displays the discontinuation notice with no other options - e.g., no ability to manage devices or check status. In addition, new devices cannot be added, despite the notice saying that this could be done through February 16th.

We confirmed with Hikvision technical support that they will help with retrieving device lists if you contact them with your credentials: URL / username / password.

They also recommended using 3rd party services listed on the DNS tab: noip, peanuthull, or dyndns.

I guess the ADI flyer is now incorrect - as they do not have a free DDNS service included...

Read this IPVM report for free.

This article is part of IPVM's 6,538 reports, 881 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Hikvision Hides Xinjiang R&D Activities on Apr 22, 2020
Hikvision has systematically deleted evidence showing their R&amp;D base and...
Huawei HiSilicon Shortage Impacts Surveillance Manufacturers on Aug 14, 2020
Huawei acknowledged problems and challenges for its HiSilicon chip business,...
ISC West 2020 Finally Cancelled on Jun 25, 2020
ISC West has now been cancelled for the third time, now for all of...
Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM...
Genetec CEO Declares "We Don't Negotiate Payment With Patent Trolls" on Aug 11, 2020
Are patent trolls like terrorists? Genetec's CEO is coming out strongly...
SIA: "Refrain From Working With Companies And/or Products That Are Implicated In Human Rights Abuses" Like Dahua and Hikvision on Aug 17, 2020
The US (Security Industry Association) SIA has taken a stand, declaring that...
Axis Compares Fever Camera Sellers to 9/11 on Sep 18, 2020
Axis Communications, the West's largest surveillance camera manufacturer, has...
Hikvision AI Training In Xinjiang Paramilitary Base, Now Denies on Mar 10, 2020
Hikvision has been listing AI training in a Xinjiang paramilitary base that...
Hikvision And Dahua Now Blocked From Conforming ONVIF Products on Apr 03, 2020
Dahua and Hikvision, sanctioned for human rights abuses, are now blocked from...
Trade Groups Request NDAA Blacklist Delay Citing Coronavirus on Apr 06, 2020
Two trade groups representing government contractors have asked Congress to...
Access Visitor Management Systems Guide on Jul 22, 2020
"Who are you, and why are you here?" Facilities that implement Visitor...
Provider Admits Seoul Bus Station Temperature Screening Wrong on Aug 31, 2020
The South Korean company, EHOO, providing the temperature tablets highlighted...
Dahua Taunts Australian Government, Continues To Sell Illegal Fever Cameras on Aug 10, 2020
Dahua is effectively taunting the Australian government by continuing to sell...
UK Firm Markets False Fever Screening, Hikvision Disavows on Jun 30, 2020
A UK security firm falsely claimed its Hikvision-based thermal solution could...

Recent Reports

New Products Show Fall 2020 continues tomorrow with Genetec, Milestone, Avigilon, Microsoft and more! on Sep 29, 2020
IPVM's sixth online show continues tomorrow and will feature New Products...
Avigilon / Motorola VS Virtual ISC West on Sep 29, 2020
ISC West has historically been so dominant that no player would think of...
Dartmouth College Deploys K3 Temperature Screening on Sep 29, 2020
While Dartmouth College has a $6+ billion endowment, the College has bought...
Hanwha AI Object Detection Tested on Sep 28, 2020
Hanwha has added detection and classification of people, cars, clothing...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...