- Messages
- 5,156
- Points
- 113
Hikvision have declared three new vulnerabilities to their partners by email this morning.
This post covers two vulnerabilities, a subsequent post will cover the other newly declared vulnerability which only affects certain devices.
Given that it is Friday morning, and my quick first impression is that this vulnerability in the web plugin has a high score and is very widely used (by everybody who uses a browser to access their Hikvision devices), I've decided to share quickly verbatim below.
NB - If YOU use a browser to view your Hikvision devices then YOU need to update this plugin - do it now please.
We may be able to dig-in and comment further in due course ...
This post covers two vulnerabilities, a subsequent post will cover the other newly declared vulnerability which only affects certain devices.
Given that it is Friday morning, and my quick first impression is that this vulnerability in the web plugin has a high score and is very widely used (by everybody who uses a browser to access their Hikvision devices), I've decided to share quickly verbatim below.
NB - If YOU use a browser to view your Hikvision devices then YOU need to update this plugin - do it now please.
We may be able to dig-in and comment further in due course ...
Web Browser Plug-in Vulnerabilities Patch
Hikvision disclosed two vulnerabilities (CVE-2023-28812, CVE-2023-28813) in a browser plug-in named LocalServiceComponents. The company has released an update (Version 1.0.0.81) to this plug-in to fix the vulnerabilities.
Hikvision has rated these vulnerabilities as 9.1 and 8.1 using the CVSS v3.1 calculator. While Hikvision is not aware of these vulnerabilities being exploited in the field, we recognize that some of our users may have installed this plug-in on their computers. We encourage our partners to work with their customers to install the update and ensure proper cyber hygiene.
With these vulnerabilities, we want to provide you with the details and timeline to reassure you of Hikvision’s strong commitment to cybersecurity following the standard Coordinated Disclosure Process. In October 2023, Hikvision Security Response Center (HSRC) was contacted by an independent security researcher, who reported two potential vulnerabilities in a Hikvision web browser plug-in. Once the HSRC confirmed the existence of the vulnerabilities, it worked with the researcher to patch and verify the successful mitigation of the reported vulnerabilities.
Last edited: