- May 21, 2014
- 48
- 19
Foscam Security Cameras Full of Security Flaws
Foscam here, but how many other Chinese manufacturers have similar problems?
Foscam here, but how many other Chinese manufacturers have similar problems?
Most have these type of flaws...use vpn and block cameras internet access...im not surprised that foscam lied about patching all known vulnerabilities...Foscam Security Cameras Full of Security Flaws
Foscam here, but how many other Chinese manufacturers have similar problems?
Foscam Security Cameras Full of Security Flaws
Foscam here, but how many other Chinese manufacturers have similar problems?
But they also had backdoors don't remember if it was Hikvision or DahuaNot all chinese cameras are bad. Hikvision and Dahua are pretty good.
Many cameras have such flaws (but also well known cameras have flaws that are still undercover and kept undercover on purpose to avoid vendors to patch them) but for those flaws listed they are "usable" only if you open their access port (HTTP and/or RTSP and/or FTP, and/or Telnet...) directly from Internet access and this is a main security issue by itself.Foscam Security Cameras Full of Security Flaws
Foscam here, but how many other Chinese manufacturers have similar problems?
Both had a some kind of backdoor but those are fixed now and hopefully not new were added.But they also had backdoors don't remember if it was Hikvision or Dahua
TrustNo1 ;-)Both had a some kind of backdoor but those are fixed now and hopefully not new were added.
Unfortunately, not for those whose cameras are not updateable, and not for those who know nothing about this.Both had a some kind of backdoor but those are fixed now and hopefully not new were added.
Those low cost chinese cameras are cheap partly because the guys do not spend too much time/resources/money into security implementation...
Mmmm.. It's not a problem if the cameras are not portforwarded.Unfortunately, not for those whose cameras are not updateable, and not for those who know nothing about this.
In other words, not for most people.
...
So the main word is never expose a camera directly on Internet.
So, does "never expose a camera directly on Internet" mean then you have no way to ever view them remotely?
When everyone talks about bad "Chinese" cameras...are there any other kind? Meaning is there any camera made. at any price in the U.S. or some other country you would trust? I assumed pretty much all cameras, and their respective firmware were made in china or other foreign country.
And when everyone talks of "Cheap" Chinese cameras, most of the models people love here, Hick and Dahua, really fall into that price category.
So is the answer just to lock cameras down to home and only view at home and miss out on a lot of the functionality?
Is there a simpler solution to just be able to safeguard the important stuff in your computer \ network where you may have private or financial information and who cares if someone somehow can view the garage or back door to the yard?
OK so the whole VPN thing is the way to go then as I have read elsewhere. I thought you were suggesting even VPN may be a bad idea and was confused. Thanks.
I think $170 for the Dahua 5321 is pretty cheap considering the quality of the image...and yeah, top 201---maybe classify as Mondo-cheap-o".
Mmmm.. It's not a problem if the cameras are not portforwarded.
Well, backdoors that connect to servers. I know that few of the chinese cameras have Malware already. I've read some article that was about chinese Ip camera that made suspicious traffic to a chinese Ip address. But if it's just something like hardcoded accounts it isn't a problem.Not really true. Not forwarding and/or blocking incoming ports just prevents unrequested incoming traffic. Unless you block/filter/isolate it in some way, then if it's on your network it can generate valid outgoing and two-way traffic in response all that it wants to just like any other local machine on your net. That includes simple annoying stuff like phoning home through at least potentially things like setting up tunnels, capturing local network traffic and forwarding it out, downloading and executing malware, attacks against remote and other local computers, altering its own firmware, etc., etc.
The "suspicious" traffic is often produced by the P2P protocol that a lot of cams have today and as I said problem is that they all have their own P2P implementation, there is no standard RFC about it (or I may say a lot of P2P cams use the same P2P servers/protocol), it may also be the internal DynDNS-like system and yes some (but not that much) may come with real malware inside.Well, backdoors that connect to servers. I know that few of the chinese cameras have Malware already. I've read some article that was about chinese Ip camera that made suspicious traffic to a chinese Ip address. But if it's just something like hardcoded accounts it isn't a problem.
Well, backdoors that connect to servers. I know that few of the chinese cameras have Malware already. I've read some article that was about chinese Ip camera that made suspicious traffic to a chinese Ip address. But if it's just something like hardcoded accounts it isn't a problem.