AIGovHub
Vendor Tracker
CCM PlatformSentinelProductsPricing
AIGovHub

The AI Compliance & Trust Stack Knowledge Engine. Helping companies become AI Act-ready.

Tools

  • AI Act Checker
  • Questionnaire Generator
  • Vendor Tracker

Resources

  • Blog
  • Guides
  • Best Tools

Company

  • About
  • Pricing
  • How We Evaluate
  • Contact

Legal

  • Privacy Policy
  • Terms of Service
  • Affiliate Disclosure

© 2026 AIGovHub. All rights reserved.

Some links on this site are affiliate links. See our disclosure.

CISA KEV catalog
CVSS 9.8 vulnerabilities
NIS2 compliance
DORA cybersecurity
critical infrastructure security
vulnerability management
threat intelligence
operational technology

CISA KEV Catalog Adds Hikvision & Rockwell CVSS 9.8 Flaws: NIS2 & DORA Compliance Implications

By AIGovHub EditorialMarch 10, 2026Updated: March 25, 202614 views

Introduction: Critical Vulnerabilities Signal Escalating Threat Landscape

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) recently added two critical security vulnerabilities to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation. The flaws include CVE-2017-7921, a CVSS 9.8-rated improper authentication vulnerability affecting Hikvision products, and another impacting Rockwell Automation systems. This action mandates federal agencies to patch these vulnerabilities by a specified deadline, but the implications extend far beyond the public sector. For organizations operating in or with the European Union, these vulnerabilities highlight urgent cybersecurity risks that intersect directly with upcoming regulatory deadlines under NIS2 and DORA. This article analyzes the technical and compliance implications, providing a roadmap for organizations to secure critical infrastructure and align with stringent cybersecurity mandates.

Threat Analysis: Understanding the CVSS 9.8 Vulnerabilities

The vulnerabilities added to CISA's KEV catalog represent severe risks to industrial control systems (ICS) and surveillance infrastructure.

CVE-2017-7921: Hikvision Authentication Bypass

CVE-2017-7921 is an improper authentication vulnerability in certain Hikvision products, rated CVSS 9.8 (Critical). This flaw allows attackers to bypass authentication mechanisms, potentially gaining unauthorized access to video surveillance systems. Such access could lead to data breaches, espionage, or disruption of physical security operations. Hikvision products are widely deployed in critical infrastructure sectors, including transportation, energy, and public facilities, making this vulnerability particularly concerning for asset management and operational technology (OT) security.

Rockwell Automation Vulnerabilities

While specific CVE details for the Rockwell Automation vulnerability were not fully disclosed in the evidence, its inclusion in the KEV catalog alongside a CVSS 9.8 rating indicates a similarly severe threat. Rockwell systems are integral to manufacturing, energy, and other industrial processes. Exploitation could result in operational disruption, safety hazards, or compromise of sensitive industrial data. The active exploitation of these flaws underscores the need for immediate remediation, especially as threat actors increasingly target OT environments.

Broader Threat Context: APT Attacks on Critical Infrastructure

These vulnerabilities are not isolated incidents. Recent campaigns, such as those by the China-linked advanced persistent threat (APT) actor tracked as UAT-9244 (associated with FamousSparrow), have targeted critical telecommunications infrastructure in South America since 2024. Using malware implants like TernDoor, PeerTime, and BruteEntry on Windows and Linux systems, these attacks demonstrate sophisticated, persistent operations against essential services. Similarly, historical incidents like MuddyWater attacks highlight how state-sponsored actors exploit vulnerabilities in supply chains and third-party software. For organizations, this context reinforces that vulnerabilities in widely used products like Hikvision and Rockwell are prime targets for actors seeking to disrupt critical infrastructure.

Regulatory Compliance Mapping: NIS2 and DORA Requirements

The exploitation of these vulnerabilities brings into sharp focus the cybersecurity obligations under EU regulations, particularly NIS2 and DORA. Organizations in scope must align their vulnerability management and incident response practices with these frameworks to avoid penalties and enhance resilience.

NIS2 Directive: Vulnerability Management and Incident Reporting

NIS2 (Directive (EU) 2022/2555) replaces the original NIS Directive and applies to "essential" and "important" entities across 18 sectors, including energy, transport, health, digital infrastructure, and public administration. Member states had a transposition deadline of 17 October 2024, with full applicability expected by 2026. Key requirements relevant to the CISA KEV vulnerabilities include:

  • Risk Management Measures: NIS2 mandates the implementation of appropriate technical and organizational measures to manage cybersecurity risks. This includes vulnerability management, such as timely patching of critical flaws like CVSS 9.8 vulnerabilities. Organizations must establish processes to identify, assess, and remediate vulnerabilities in their systems, including those in third-party products like Hikvision and Rockwell.
  • Incident Reporting: NIS2 requires entities to report significant incidents to relevant authorities. For actively exploited vulnerabilities, early detection and reporting are crucial. The directive specifies timelines: an early warning within 24 hours of becoming aware of an incident, followed by a notification within 72 hours. Exploitation of these vulnerabilities could trigger these reporting obligations if it leads to a security incident affecting services.
  • Supply Chain Security: NIS2 emphasizes securing supply chains, requiring entities to assess and mitigate risks from third-party providers. The use of vulnerable products from vendors like Hikvision or Rockwell necessitates due diligence and contractual safeguards to ensure compliance.
  • Management Accountability: Senior management must oversee cybersecurity risk management, with penalties for non-compliance up to EUR 10 million or 2% of global annual turnover for essential entities.

For organizations subject to NIS2, the CISA KEV catalog serves as a valuable threat intelligence source to prioritize patching and demonstrate proactive risk management.

DORA: Digital Operational Resilience for Financial Entities

DORA (Regulation (EU) 2022/2554) applies to financial entities, including banks, insurers, investment firms, and crypto-asset service providers, with full applicability from 17 January 2025. While focused on financial services, its principles are relevant to critical infrastructure security broadly. Key aspects include:

  • ICT Risk Management Framework: DORA requires a comprehensive framework to manage ICT risks, including vulnerabilities in ICT systems. Financial entities must implement policies for patch management to address critical vulnerabilities promptly, akin to the CISA-mandated actions for federal agencies.
  • Digital Operational Resilience Testing: DORA mandates regular testing, including threat-led penetration testing (TLPT), to assess resilience against advanced threats. Vulnerabilities like CVE-2017-7921 should be incorporated into testing scenarios to evaluate defenses against real-world exploitation.
  • Third-Party ICT Risk Management: Financial entities must manage risks from third-party providers, such as vendors of surveillance or industrial control systems. This involves assessing the cybersecurity posture of providers and ensuring contracts require timely vulnerability remediation.
  • Incident Reporting: Similar to NIS2, DORA requires reporting of major ICT-related incidents to authorities, emphasizing the need for robust monitoring to detect exploitation attempts.

DORA's focus on operational resilience aligns with the need to protect critical systems from vulnerabilities that could disrupt financial services or broader infrastructure.

Alignment with Other Frameworks

These regulations complement broader cybersecurity standards. For example, NIST Cybersecurity Framework (CSF) 2.0, published 26 February 2024, includes functions like Identify, Protect, Detect, Respond, and Recover, with a new Govern function emphasizing risk management. The CISA KEV catalog can inform the "Identify" and "Protect" functions by highlighting critical vulnerabilities. Additionally, ISO/IEC 27001:2022 provides a certifiable standard for information security management systems, with controls relevant to patch management and supplier relationships. While SOC 2 is an attestation (not a certification) based on Trust Services Criteria, it often requires vendors to demonstrate vulnerability management practices, making it a key consideration for third-party risk assessments.

Step-by-Step Actions for Mitigation and Compliance

Organizations must take immediate and structured actions to address these vulnerabilities and align with NIS2, DORA, and other frameworks. Here is a practical roadmap:

1. Immediate Vulnerability Remediation

  • Patch Management: Prioritize patching for CVE-2017-7921 and any related Rockwell Automation vulnerabilities. Follow vendor advisories and CISA guidelines. For legacy systems where patching is not feasible, implement compensating controls such as network segmentation, access restrictions, or intrusion detection systems.
  • Asset Inventory: Maintain an up-to-date inventory of all assets, including Hikvision and Rockwell products. Use automated tools to scan for vulnerable versions and track remediation status.

2. Enhanced Monitoring and Detection

  • Threat Intelligence Integration: Subscribe to threat intelligence feeds, including the CISA KEV catalog, to receive real-time alerts on exploited vulnerabilities. Tools like AIGovHub's cybersecurity compliance platform can provide automated alerts and compliance insights tailored to your industry.
  • Continuous Monitoring: Deploy security monitoring solutions to detect exploitation attempts. Focus on network traffic to and from OT devices, authentication logs for suspicious access, and anomalies in system behavior.

3. Third-Party Risk Assessment

  • Vendor Due Diligence: Assess the cybersecurity practices of third-party vendors, especially those providing critical infrastructure components. Require evidence of vulnerability management, such as adherence to standards like ISO 27001 or SOC 2 reports.
  • Contractual Safeguards: Include clauses in vendor contracts mandating timely patching of critical vulnerabilities and notification of security incidents. For guidance on evaluating AI governance platforms in regulated environments, see our analysis of EU AI Office developments.

4. Compliance Program Alignment

  • Incident Response Planning: Update incident response plans to incorporate procedures for reporting under NIS2 and DORA. Conduct tabletop exercises simulating exploitation of CVSS 9.8 vulnerabilities to test readiness.
  • Documentation and Reporting: Maintain records of vulnerability assessments, patching activities, and risk assessments to demonstrate compliance during audits. Use frameworks like NIST CSF 2.0 to structure your cybersecurity program.
  • Training and Awareness: Educate staff on the risks of OT vulnerabilities and regulatory requirements. Include specific scenarios based on recent threats, such as APT attacks on telecommunications infrastructure.

5. Leverage Technology and Tools

  • Automated Compliance Platforms: Consider solutions that streamline compliance with multiple regulations. AIGovHub offers tools for vendor evaluations and SOC 2 readiness, helping organizations manage third-party risks and maintain audit trails. For insights into AI-specific security flaws, refer to our coverage of Microsoft Copilot vulnerabilities.
  • Vulnerability Management Software: Implement software that automates vulnerability scanning, prioritization based on threat intelligence (like KEV entries), and patch deployment workflows.

Key Takeaways and Lessons for Critical Infrastructure Security

  • Active Exploitation Demands Urgency: The addition of CVSS 9.8 vulnerabilities to CISA's KEV catalog is a clear signal that these flaws are being exploited in the wild. Organizations must prioritize patching and mitigation to prevent breaches and operational disruptions.
  • Regulatory Deadlines Are Approaching: NIS2 compliance is expected by 2026, with member state transposition due by 17 October 2024. DORA applies from 17 January 2025. Proactive vulnerability management is essential to meet these mandates and avoid penalties.
  • Supply Chain Risks Are Critical: Vulnerabilities in third-party products, like Hikvision and Rockwell, highlight the importance of supply chain security under NIS2 and DORA. Regular risk assessments and contractual controls are necessary.
  • Threat Intelligence Informs Compliance: Leveraging resources like the CISA KEV catalog can enhance risk management and demonstrate due diligence to regulators. Integrating threat intelligence into compliance programs is a best practice.
  • Cross-Framework Alignment Strengthens Defenses: Aligning actions with NIST CSF, ISO 27001, and sector-specific regulations creates a robust cybersecurity posture. For example, the Govern function in NIST CSF 2.0 supports NIS2's management accountability requirements.

Conclusion: Proactive Steps for Resilience and Compliance

The exploitation of Hikvision and Rockwell vulnerabilities underscores a escalating threat landscape where critical infrastructure is increasingly targeted. For organizations in scope of NIS2 and DORA, this is not just a technical issue but a compliance imperative. By taking immediate remediation steps, enhancing monitoring, assessing third-party risks, and aligning with regulatory frameworks, businesses can mitigate these threats and build digital operational resilience. As regulations evolve, staying informed through resources like AIGovHub's cybersecurity compliance platform can provide real-time alerts and tailored guidance. Remember, cybersecurity is a continuous journey—start by addressing these critical vulnerabilities today to secure your infrastructure for tomorrow.

This content is for informational purposes only and does not constitute legal advice.