Yep the web server only - "vulnerability in the web server of some Hikvision product"
Hikvision Security Advisory
Hikvision Security Advisory
It appears R6 is vulnerable? From someone who reached out to Hikvision UK:Those look to be IPC_R0 and IPC_R6 and you should be fine.
Hikvision UK said:Yes, your model is not on the initial list of affected cameras, but in reality, this issue will affect almost all Hikvision cameras as most of them are not running firmware with a build time more recent than 210625 (25th June 2021). If you go back to that vulnerability post you will see that I have updated the fixed firmware table today with more models that were not on the initial list.
Currently, Hikvision has not published a fixed firmware for R6 cameras (2x22FWD, 2x42FWD) like the one you have, but there should be a new version posted in the next couple of days.
I should also point out that we are based in the UK so all the firmware I have linked to in that table is from the UK & EU portals and those versions may not be compatible with US camera models.
If you can't get a response from US Hikvision support then I would just keep monitoring the product page because the fixed firmware should be posted publicly soon.
This (5.5.114) is regarding that firmware based on G5 (C) models and has the led lights into it ;-) I'm not sure if 5.5.800 (for the remove of the vulnerabilities) for the firmware based on G3 (non-C) models also remove the LED part. That was for sure the case in de (C) model firmware, but i haven't installed this new firmware on my G3 firmware devices.It seems that the new firmware removes the feature to link the LEDs to motion detection on model 2047G2 and 2087G2 .
Its only available in version 5.5.114
This is ridiculous.
before:
View attachment 102631
after update:
View attachment 102632
Those look to be IPC_R0 and IPC_R6 and you should be fine.
A good rule of thumb, is to check the Hikvision's Global Firmware site, and if there's new firmware for your camera there apply it (assuming it's a non-imported camera).
It's a genuine software bug.Well Done @alastairstevenson and @watchful_ip on discovering the vulnerability.
Would you guys describe this as a latent defect?
All credit to @watchful_ip - all I did was provide the testing ground.Well Done @alastairstevenson and @watchful_ip on discovering the vulnerability.
Way more than that!All credit to @watchful_ip - all I did was provide the testing ground.