


Dahua IP Camera Vulnerability Could Let Attackers Take Full Control Over Devices
Researchers discovered a new vulnerability (CVE-2022-30563) in Dahua IP cameras that can be exploited by remote attackers to compromise the cameras.

So first you have to expose your camera to the internet and perform an unencrypted login. Then leave the camera exposed to the internet in this “encrypted” fashion so that someone can then “replay” the authentication info to the encrypted camera. Sounds like the thief would have to work with an inside person to make this work.What a shit article, no mention of when or how a previously unencrypted ONVIF interaction would occur!
So put some aluminum foil around my BI PC and don’t let my wife login?
So first you have to expose your camera to the internet and perform an unencrypted login. Then leave the camera exposed to the internet in this “encrypted” fashion so that someone can then “replay” the authentication info to the encrypted camera. Sounds like the thief would have to work with an inside person to make this work.
Curiously, while it is in this “unencrypted” state, why wouldn’t the thief just log in at that time? So you recorded this unencrypted transaction, but you sit around and wait for the user to turn encryption back on?
Does anyone know where this encrypted/unencrypted setting is in the Dahua menu?
Make note in that article that is says Axis has had similar issues as well, along with Reolink and Annke.
But you do not need to first expose your camera to the internet and perform an unencrypted login.
Not a single camera I am currently using has touched the internet. They are all setup on an old Win7 laptop that is so old it doesn't even have wifi. This computer has zero internet access. I set it up to the IP address range of my camera NIC that does not have internet access before I put it onto my system.
Personally, I'd use the type of sheet seen below. It's constructed from heavyweight aluminum sheets that surround a layer of air which ultimately provides a true 'air gapped' system
View attachment 135018
My BI Machine is still running Win7 Pro.Make note in that article that is says Axis has had similar issues as well, along with Reolink and Annke.
But you do not need to first expose your camera to the internet and perform an unencrypted login.
Not a single camera I am currently using has touched the internet. They are all setup on an old Win7 laptop that is so old it doesn't even have wifi. This computer has zero internet access. I set it up to the IP address range of my camera NIC that does not have internet access before I put it onto my system.
OK, so a self-signed cert lacks assurance, but it doesn't weaken the underlying encryption strength of the SSL implementation.The encryption scheme is flawed in camera systems to begin with because of the use of SSL self signed system to begin with. Which is outdated technology that its hacks has been documented for decades. Once a camera manufacturer comes up with some sort of different encryption scheme instead of relying on a flawed web subsystem it will be secure 100% till then, there is no assurances.
chances on a mtm attack on a camera is unlikely, but I find purchasing one per camera is not going to be much better since now it has to be exposed to the internet for one of those certs to work properly. The issue with it is that the cert itself needs to be the ip address of the cam. Which you can't get buy a 3rd party cert with a private ip address. Now if the camera manufacturer had a signing server we could add to the cam network, the system could create its own 3rd party cert and not have to deal with the shortcomings of self signed.OK, so a self-signed cert lacks assurance, but it doesn't weaken the underlying encryption strength of the SSL implementation.
And a purchased certificate with verifiable assurance can be imported if needed.
Does anyone know where this encrypted/unencrypted setting is in the Dahua menu?