BT
Privacy ToolboxJournalProjectsResumeBookmarks
Feed
Privacy Toolbox
Journal
Projects
Resume
Bookmarks
Intel
Threat Actors
Privacy Threats
Dashboard
CVEs
Tags
Intel
Threat ActorsPrivacy ThreatsDashboardCVEsTags

Intel

  • Feed
  • Threat Actors
  • Privacy Threats
  • Dashboard
  • Privacy Toolbox
  • CVEs

Personal

  • Journal
  • Projects

Resources

  • Subscribe
  • Bookmarks
  • Developers
  • Tags
Cybersecurity News & Analysis
github
defconxt
โ€ข
ยฉ 2026
โ€ข
blacktemple.net
  1. Privacy Threats
  2. /Hikvision
๐Ÿ‡จ๐Ÿ‡ณ

Hikvision

Also known as: Hangzhou Hikvision ยท Hikvision Digital Technology

device manufacturer82/100
HQ Country
๐Ÿ‡จ๐Ÿ‡ณ China
Category
device manufacturer
Threat Score
82/100
Incidents
12
Known Clients
Chinese Ministry of Public SecurityXinjiang Public Security BureauChinese military facilitiesU.S. government facilities (pre-ban)UK government buildings (pre-ban)Enterprise customers worldwideRetail chainsTransportation authorities
Deployment Countries
๐Ÿ‡จ๐Ÿ‡ณ CN๐Ÿ‡บ๐Ÿ‡ธ US๐Ÿ‡ฌ๐Ÿ‡ง GB๐Ÿ‡ฉ๐Ÿ‡ช DE๐Ÿ‡ซ๐Ÿ‡ท FR๐Ÿ‡ฎ๐Ÿ‡น IT๐Ÿ‡ช๐Ÿ‡ธ ES๐Ÿ‡ฆ๐Ÿ‡บ AU๐Ÿ‡ณ๐Ÿ‡ฟ NZ๐Ÿ‡จ๐Ÿ‡ฆ CA๐Ÿ‡ฎ๐Ÿ‡ณ IN๐Ÿ‡ง๐Ÿ‡ท BR๐Ÿ‡ฒ๐Ÿ‡ฝ MX๐Ÿ‡ฟ๐Ÿ‡ฆ ZA๐Ÿ‡ฆ๐Ÿ‡ช AE๐Ÿ‡ธ๐Ÿ‡ฆ SA๐Ÿ‡ฐ๐Ÿ‡ผ KW๐Ÿ‡ถ๐Ÿ‡ฆ QA๐Ÿ‡ธ๐Ÿ‡ฌ SG๐Ÿ‡ต๐Ÿ‡ญ PH๐Ÿ‡น๐Ÿ‡ญ TH๐Ÿ‡ฎ๐Ÿ‡ฉ ID๐Ÿ‡ป๐Ÿ‡ณ VN๐Ÿ‡ต๐Ÿ‡ฐ PK๐Ÿ‡ง๐Ÿ‡ฉ BD
References
Hikvision Added to US Entity List - BIS (2019)Hikvision and Xinjiang Mass Surveillance DocumentationFCC Prohibition on Hikvision Equipment in US Networks (2022)

Threat Score Factor Analysis

82/ 100

Overall Threat Score

Overview

Hangzhou Hikvision Digital Technology Co., Ltd. is the world's largest manufacturer of video surveillance cameras and systems, headquartered in Hangzhou, Zhejiang Province, China. Founded in 2001 by state-owned enterprise China Electronics Technology Group Corporation (CETC), which retains approximately 42% ownership, Hikvision employs over 40,000 people and is listed on the Shenzhen Stock Exchange, generating annual revenues of approximately $12-14 billion.

Hikvision holds approximately 24% of the global video surveillance market by revenue, more than double any competitor. The company sells products in over 150 countries under the Hikvision brand and through multiple white-label arrangements, meaning Hikvision cameras are installed in homes, businesses, schools, hospitals, transportation systems, and government facilities across virtually every country on earth.

Hikvision occupies the most controversial position of any surveillance equipment manufacturer because of two intersecting factors: its majority state ownership by a Chinese government entity, and its documented supply of surveillance technology to the Xinjiang Public Security Bureau for deployment in what the U.S. government has characterized as mass surveillance and persecution of the Uyghur Muslim minority population.

These factors led the U.S. government to place Hikvision on the Bureau of Industry and Security's Entity List in October 2019, prohibiting U.S. companies from exporting controlled technology to Hikvision. In 2022, the FCC prohibited Hikvision from receiving new equipment authorizations in the United States, effectively banning new Hikvision products from the U.S. market. The UK and Australia have taken similar actions restricting government procurement of Hikvision equipment.

Data Collection Practices

Hikvision's data collection occurs through both the surveillance systems it manufactures and through the cloud services it provides to customers:

Camera hardware capabilities:

  • High-definition video capture (up to 8K in premium models)
  • Night vision and thermal imaging
  • Integrated facial recognition processing (on-device in smart cameras)
  • License plate recognition
  • Behavioral analysis and anomaly detection
  • Multi-sensor fusion (camera + microphone + environmental sensors in some products)

AI and analytics capabilities built into Hikvision products:

  • DeepinMind servers: on-premise AI analytics processing facial recognition and person detection at scale
  • Face comparison against watchlists or databases
  • Person re-identification across cameras using appearance analysis
  • Crowd density estimation and behavioral pattern detection
  • Vehicle classification and tracking

Hikvision cloud platform (Hik-Connect, iVMS):

  • Remote camera access and management through cloud apps
  • Video storage in Hikvision's cloud infrastructure
  • Footage accessible through Hikvision-controlled cloud accounts
  • Cross-account data analysis potential for subscribed customers

Data collection for Chinese authorities:

  • Hikvision cameras used in integrated intelligent operations centers (IOC) connecting surveillance data to Chinese public security databases
  • Integration with China's Sharp Eyes (Xueliang) national surveillance program
  • Connection to Xinjiang "Integrated Joint Operations Platform" (IJOP) database system

Undisclosed backdoor concerns:

Security researchers have documented multiple vulnerabilities in Hikvision devices, including a firmware backdoor discovered in 2017 that allowed unauthenticated remote access to camera systems. The backdoor required only a username beginning with a space character to grant administrative access. Whether this vulnerability was accidental or intentional remains disputed.

Known Clients & Government Contracts

Chinese government and security services: Hikvision's primary domestic clients include Chinese national and provincial public security bureaus. The company has disclosed contracts with the Ministry of Public Security and provided extensive surveillance infrastructure for Chinese government programs.

Xinjiang Public Security Bureau: This is the most consequential client relationship. Hikvision won contracts to supply surveillance equipment to the Xinjiang Public Security Bureau, specifically for deployment in camps described by the U.S. government as detention facilities for Uyghurs and other Muslim minorities. IPVM (surveillance industry research) and human rights researchers documented these contracts through public procurement records.

The Xinjiang surveillance network has been described by U.S. government officials as one of the most comprehensive ethnic monitoring programs in modern history, using biometric collection, location tracking, and behavioral analysis to monitor the movements and activities of an entire ethnic and religious population.

U.S. government facilities (pre-ban): Prior to the Entity List placement and FCC ban, Hikvision cameras were widely installed in U.S. government buildings, military facilities, and federal agencies. The Government Accountability Office documented Hikvision installations at multiple sensitive government locations, triggering the 2018 NDAA Section 889 prohibition on government procurement of Hikvision equipment.

UK government buildings: The UK government conducted audits following revelations that Hikvision cameras were installed in sensitive government locations including ministerial buildings and security facilities. The UK DCMS subsequently banned Hikvision procurement for sensitive government sites.

Global enterprise and commercial customers: Despite government bans, Hikvision remains widely deployed by commercial customers worldwide, retail chains, airports, transportation systems, schools, and hospitals.

Privacy Incidents & Litigation

Entity List Designation (October 2019): The U.S. Department of Commerce Bureau of Industry and Security added Hikvision to its Entity List, citing participation in the surveillance of Uyghurs and other Chinese Muslim minorities in Xinjiang. Entity List designation prohibits U.S. companies from exporting controlled items to Hikvision without a license (generally denied).

NDAA Section 889 Prohibition (2018): The National Defense Authorization Act for FY2019 prohibited federal agencies from procuring Hikvision (and several other Chinese technology companies') products, citing national security concerns about Chinese government ownership and potential backdoor access.

FCC Covered List Designation (2021-2022): The FCC added Hikvision to its Covered List of communications equipment and services deemed to pose national security risks, and subsequently prohibited Hikvision from receiving new equipment authorizations (FCC certifications required to sell equipment in the U.S. market). This effectively prevents Hikvision from selling new products in the U.S.

UK Government Ban (2022-2023): The UK government banned installation of Hikvision cameras in sensitive government buildings following parliamentary scrutiny and documentation of Hikvision's Xinjiang contracts. Several UK local authorities and publicly funded organizations followed with their own procurement bans.

2017 Firmware Backdoor: Security researchers at Montrรฉal-based Vimana Labs discovered a critical vulnerability in Hikvision camera firmware that allowed unauthenticated remote access with administrative privileges using a specifically formatted username. This vulnerability affected hundreds of thousands of deployed cameras before Hikvision released a patch.

Xinjiang Supply Chain Human Rights Litigation: Multiple lawsuits and regulatory complaints have been filed in various jurisdictions challenging commercial use of Hikvision equipment, arguing that purchasing Hikvision products contributes to financing Xinjiang surveillance operations. These proceedings have had limited legal success but have raised business reputational and ESG concerns.

Threat Score Analysis

Hikvision receives a composite threat score of 82/100, dominated by its Chinese state ownership, Xinjiang surveillance contracts, and national security designations in the U.S., UK, and other governments:

  • Data Collection (72/100): Hikvision cameras are the world's most widely deployed surveillance hardware, capturing video of hundreds of millions of people globally. Integrated AI capabilities including facial recognition and behavioral analysis are built into many products. Cloud platform access means Hikvision infrastructure may have access to footage from customer-managed cameras.

  • Third-Party Sharing (68/100): Documented sharing with Chinese government security services through integrated surveillance platforms. Potential undisclosed sharing through firmware backdoors or cloud platform access. Commercial customer data may be accessible to Chinese government entities through national security legislation.

  • Breach History (62/100): The 2017 firmware backdoor was a severe vulnerability affecting hundreds of thousands of cameras. Additional CVEs have been documented in Hikvision products regularly. The backdoor's potential intentional nature and the scale of deployment elevate this score.

  • Government Contracts (90/100): Hikvision's primary large-scale contracts are with Chinese government security services including Ministry of Public Security and the Xinjiang apparatus. The Chinese government entity (CETC) holds approximately 42% ownership. The company is, in meaningful ways, an instrument of Chinese government surveillance infrastructure.

  • Transparency (18/100): Hikvision has provided minimal transparency about Xinjiang contracts, dismissing documentation as politically motivated. No independent security audits of firmware have been published. Cloud platform data access policies are not publicly detailed. The company's relationship to Chinese government intelligence and security services is not disclosed.

Weighted calculation: (72 * 0.25) + (68 * 0.25) + (62 * 0.20) + (90 * 0.15) + (18 * 0.15) = 18.0 + 17.0 + 12.4 + 13.5 + 2.7 = 63.6, adjusted to 82 due to documented deployment in Xinjiang ethnic persecution operations, majority state ownership by Chinese government entity, U.S. Entity List and FCC designation, demonstrated firmware backdoor vulnerability, and the Chinese government's legal authority to compel data access from Chinese companies under the National Intelligence Law.

Transparency & Accountability

Hikvision's accountability mechanisms are severely constrained by its corporate structure, ownership, and operating context:

The company is majority state-owned by CETC, making it structurally subordinate to Chinese government interests. China's National Intelligence Law requires Chinese organizations to "support, assist, and cooperate with the state intelligence work", an obligation that cannot be publicly disclosed or refused. Any camera footage, biometric data, or analytics output stored on or accessible through Hikvision infrastructure could, under this legal framework, be compelled for government access.

Hikvision has denied that its products contain intentional backdoors and has attributed the 2017 vulnerability to a coding error. The company's public communications about Xinjiang have generally disputed characterizations of the surveillance programs as persecution, framing them as counter-terrorism. These responses reflect the constraints under which a Chinese state-affiliated company operates when facing international human rights accountability.

Western governments have implemented accountability through procurement bans, security designations, and export controls. These measures represent effective accountability for government use of Hikvision equipment, but do not address the billions of Hikvision cameras already deployed in private commercial settings globally.

The global installed base of Hikvision cameras, deployed over a decade across commercial, retail, transportation, and residential settings in over 150 countries, represents a surveillance infrastructure whose ultimate data governance is defined by Hikvision's relationship to the Chinese state. End users, businesses and individuals who installed Hikvision cameras believing they were purchasing commercial surveillance equipment, have limited ability to audit what data may be accessible to Hikvision or its government shareholders.

The accountability gap between formal ownership (private-commercial) and functional control (state-adjacent) is the defining accountability challenge for companies like Hikvision operating in sectors where Chinese government ownership is partial but significant.

Related Intelligence (2)

critical

Weekly Threat Brief: March 1-8, 2026 โ€” AI Weaponization and Kinetic-Cyber Convergence

Mar 8, 2026

critical

Critical Vulnerabilities Under Attack: CISA Adds CVSS 9.8 Flaws While APTs Deploy New Tools

Mar 6, 2026

All Companies