Proactive system security

If you suspect a security vulnerability with a Milestone product or service, please report the problem immediately.
Milestone will reply within 48 hours.

What we can do to help

Ensuring the security and integrity of all Milestone installations will always remain a top priority to us. Use this page to learn more or to contact us if you suspect you have a cybersecurity vulnerability. We minimize customers’ exposure to risk by ensuring our software and hardware is secure by design, secure by default and secure by deployment.

If a vulnerability flaw is detected, Milestone will provide mitigations and/or software updates as soon as possible with security fixes to customers and partners free of charge – provided the product is still supported.

To learn more about recent vulnerabilities and their mitigation please refer to our articles on cyber security
Article Topic Affected Products Date Published Full Article
1 XProtect Configuration API security vulnerability and mitigation XProtect Corporate, Expert, Professional+, Express+, Essential+ versions 2016 R1 (10.0a) - 2019 R1 (13.1a) March 22 2019 Read More
2 .NET Framework Remoting Potential Security Vulnerability XProtect Corporate, Expert, Professional+, Express+, Essential+ April 25 2018 Read More
3 Unsupported MSXML version in XProtect VMS All Jan 16 2018 Read more
4 Meltdown and Spectre attacks All operating systems Jan 5 2018 Read more
5 CCleaner 5.33 Malware Windows operating system Sep 20 2017 Read more
6 How to identify and remove default XProtect Basic User account XProtect® Express 2017 R1 (11.1a) and prior versions, XProtect® Essential 2.0 2017 R1 Aug 29 2017 Read more
7 Husky M10 privilege escalation issue Milestone Husky M10 Aug 21 2017 Read more
8 ONVIF potential security vulnerability Genivia gSOAP Toolkit versions 2.7 to 2.8.47 Jul 7 2017 Read more

Is your installation cyber secure?

Take our online course and learn how to identify cybersecurity threats of different kinds.

Blue checkmark
Network, server, client, and device vulnerabilities

Blue checkmark
Physical access and tampering
Blue checkmark
Human or behavioral vulnerabilities.