Solution by Industry
Physical security solutions designed for specific industries and real-world operating environments.
Solution by Application
Surveillance and security solutions designed for specific use cases and security challenges.
Solution by Technology
Integrated technologies powering intelligent security solutions across environments.
Video Management Platforms
On-premise and cloud-based VMS platforms for unified video management.
Network Cameras
Network cameras offering flexible options for different environments and industry needs.
Onboard Security
Onboard security designed for real-time surveillance in transit and transportation.
Network Video Recorder and Appliance
Recording appliances for secure storage and cloud-connected management.
Integration Plug-ins
Integration plug-ins that connect management software with third-party platforms and tools.
Networking
Networking products provide network connectivity & power supply for stable transmission.
Accessories
Accessories designed for various installations, integration, and operation of surveillance products.
Facial Recognition
Facial recognition devices for identifying and verifying individuals.
Legacy Products
Legacy products maintained for reference and existing deployments.
Learning
Explore the latest physical security insights through cases, articles, videos, and webinars.
Download Center
Download software, firmware, datasheets, QIGs, manuals, and technical documents.
Management Tools
Support resources for warranty, service requests, cybersecurity, and customer assistance.
Design Tools
Management tools for device setup, maintenance, and compatibility verification.
Support
Planning tools to design, calculate, and deploy surveillance system projects.
Partner Portal
Access the VPP Portal and VORTEX Reseller Portal for partner programs and services.
Technology Partners
Technology partners and programs offering VADP collaboration and exclusive A&E/C support.
Where to Buy
Find authorized distributors and resellers for our products in your country.
Sales Map
As IoT and remote work grow, so do cybersecurity risks. VIVOTEK is committed to safeguarding devices and data at every stage of our product lifecycle—from development and verification to manufacturing, delivery, and ongoing service. We continuously evaluate emerging threats and enhance our security measures to ensure your business receives the most secure and reliable solutions.
Our military-grade cybersecurity shields your data from on-premises to cloud with seamless, end-to-end protection. From hardware-level TPM encryption and secure boot to AES-256 transit security and cloud integration, we deliver comprehensive defense at every layer—ensuring your valuable data remains secure throughout its entire journey.
To effectively protect your network and devices, it is important to recognize that security ultimately depends on your own risk assessments, configuration decisions, and ongoing maintenance. We strongly recommend that all users:
By continuously evaluating your own risk exposure and applying these measures, you can significantly reduce the likelihood and impact of cyberattacks on your network and devices.
Please contact us at VIVOTEK Support Center to report a vulnerability or other security concern.
Latest Update: 2025/12/12
Advisory ID
|
Advisory | CVE ID | Status | Last Updated |
|---|---|---|---|---|
| VVTK-SA-2022-01 | None of VIVOTEK Product is Affected by Linux Kernel Privilege Escalation Vulnerability | CVE-2022-0847 | Confirmed | March 09, 2022 |
| VVTK-SA-2021-01 | No VIVOTEK Products are Affected by Apache Log4j Vulnerability | CVE-2021-44228 | Confirmed | December 16, 2021 |
| VVTK-SA-2020-001 | Allow Remote Command Execution via Uploaded Customized Script CVE-2020-11950 - #1 Remote Command Execution CVE-2020-11949 - #2 Arbitrary File Download |
CVE-2020-11950, CVE-2020-11949 | Fixed | May 26 2020 |
| VVTK-SA-2019-004 | Command Injection Vulnerability via CGI | CVE-2019-19936 | Fixed | Jan 13 2020 |
| VVTK-SA-2019-003 | Multiple Linux Kernel DoS Vulnerabilities | CVE-2019-11477, CVE-2019-11478, CVE-2019-11479 | Partial Fixed | Sep 6 2019 |
| VVTK-SA-2019-002 | Remote DoS and Stack Overflow of Web Server | CVE-2019-14457, CVE-2019-14458 | Fixed | Sep 10 2019 |
| VVTK-SA-2019-001 | Authentication Bypass | CVE-2019-10256 | Fixed | July 24 2019 |
| VVTK-SA-2018-006 | Multiple XSS Vulnerabilities and Hidden Service Notification | CVE-2018-18244, CVE-2018-18005, CVE-2018-18004 | Fixed | Dec 28 2018 |
| VVTK-SA-2018-005 | Linux Kernel DoS Vulnerability | CVE-2018-5391 | Fixed | Sep 4 2019 |
| VVTK-SA-2018-004 | Cross-Site Request Forgery (CSRF) | CVE-2018-14769 | Fixed | Aug 24 2018 |
| VVTK-SA-2018-003 | Multiple Command Injection Vulnerabilities | CVE-2018-14768, CVE-2018-14771, CVE-2018-14770 | Fixed | Aug 24 2018 |
| VVTK-SA-2018-002 | KRACK - WPA2 Key Reinstallation Attacks | CVE-2017-13077, CVE-2017-13078, CVE-2017-13079, CVE-2017-13080, CVE-2107-13081, CVE-2017-13082, CVE-2017-13084, CVE-2017-13086, CVE-2017-13087, CVE-2017-13088 | Fixed | Aug 24 2018 |
| VVTK-SA-2018-001 | CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 | Confirmed | Jan 10 2018 | |
| VVTK-SA-20171001-01 | Remote Stack Overflow of Web Server | - | Fixed | Nov 14 2017 |
| VVTK-SA-20170621-01 | CVE-2017-9765 - gSOAP | CVE-2017-9765 | Fixed | Aug 17 2017 |
| VVTK-SA-20170623-02 | CVE-2017-9829 - Arbitrary File Download | CVE-2017-9829 | Fixed | Nov 10 2017 |
| VVTK-SA-20170623-01 | CVE-2017-9828 - Shell Command Injection | CVE-2017-9828 | Fixed | Nov 10 2017 |
| - | Cybersecurity Announcement Jul 7 2017 | Fixed | Jul 7 2017 | |
| - | Cybersecurity Announcement Nov 4 2016 | Confirmed | Nov 4 2016 |