ANAVEM
Reference
Languagefr
Dark server room with red warning lights and industrial control panels

CISA Adds Hikvision, Rockwell Flaws to KEV Catalog

CISA added two actively exploited vulnerabilities affecting Hikvision and Rockwell Automation products to its Known Exploited Vulnerabilities catalog on March 6.

Emanuel DE ALMEIDAEmanuel DE ALMEIDA
6 March 2026, 07:30 2 min read 6

Last updated 17 March 2026, 05:32

SEVERITYCritical 9.8/10
CVE IDCVE-2017-7921
EXPLOITActive Exploit
PATCH STATUSAvailable
VENDORHikvision, Rockwell Automation
AFFECTEDHikvision surveillance equipme...
CATEGORYVulnerabilities

Key Takeaways

CISA Flags Active Exploitation of Critical Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency added two security vulnerabilities to its Known Exploited Vulnerabilities catalog on March 6, 2026. The agency cited evidence of active exploitation targeting Hikvision and Rockwell Automation products in enterprise environments.

CVE-2017-7921 represents the most severe flaw with a CVSS score of 9.8, classified as an improper authentication vulnerability. The second vulnerability affects Rockwell Automation systems, though specific technical details weren't disclosed in the initial advisory.

Industrial and Surveillance Systems at Risk

Organizations using Hikvision surveillance equipment and Rockwell Automation industrial control systems face immediate exposure. The vulnerabilities affect multiple product lines across both vendors' portfolios.

Critical infrastructure operators, manufacturing facilities, and enterprises with IP camera deployments represent the primary target base for these actively exploited flaws.

Related: Veeam Patches Four Critical RCE Flaws in Backup Software

Related: HPE Patches Five Critical AOS-CX Flaws: RCE, Privilege

Related: Cisco Confirms Active Exploitation of Max-Severity CVE

Related: CISA adds Ivanti EPM flaw to exploited vulnerabilities list

Federal Agencies Must Patch by March 27

CISA's KEV listing mandates federal agencies patch these vulnerabilities by March 27, 2026. Private sector organizations should prioritize immediate remediation given the confirmed active exploitation.

The improper authentication flaw in CVE-2017-7921 allows attackers to bypass security controls and gain unauthorized access to affected Hikvision devices. Organizations should review their network segmentation and access controls while applying vendor patches.

Frequently Asked Questions

What is CVE-2017-7921 and why is it critical?+
CVE-2017-7921 is an improper authentication vulnerability affecting Hikvision products with a CVSS score of 9.8. It allows attackers to bypass security controls and gain unauthorized access to surveillance systems.
When must federal agencies patch these CISA KEV vulnerabilities?+
Federal agencies must patch CVE-2017-7921 and the Rockwell Automation vulnerability by March 27, 2026. CISA added both flaws to its Known Exploited Vulnerabilities catalog on March 6.
Which products are affected by the CISA KEV additions?+
The vulnerabilities affect Hikvision surveillance equipment and Rockwell Automation industrial control systems. Organizations using these products face immediate risk from active exploitation.
Emanuel DE ALMEIDA
About the Author

Emanuel DE ALMEIDA

Senior IT Journalist & Cloud Architect

Microsoft MCSA-certified Cloud Architect | Fortinet-focused. I modernize cloud, hybrid & on-prem infrastructure for reliability, security, performance and cost control - sharing field-tested ops & troubleshooting.

Discussion

Share your thoughts and insights

You must be logged in to comment.

Loading comments...