The vulnerability is with the camera's firmware allowing remote unauthorized access on your network, a NVR has no mitigating effect.Are cameras behind a hikvision NVR also vulnerable to the same backdoor?
The vulnerability is with the camera's firmware allowing remote unauthorized access on your network, a NVR has no mitigating effect.
You can 1. fix the firmware or 2. have a secure network with no "outside" access for an attacker to exploit the vulnerability.
So after going back and forth with Annke's first line tech support trying to get them to understand this was a significant issue given that this and lots of their relabeled cameras likely are subject to the same and them saying that it wasn't a problem for a variety of reasons, even though I confirmed that the cam is in fact vulnerable even after the update, they finally told me that "As a technical support, we know better for our product."
I don't know how your network is set up, as a rule of thumb I don't advise enabling upnp on anything.If I disable upnp from the NVR, does that disable access to the cameras even if the cameras have upnp activated?
Alright! Maybe its time to make a new password reset tool that works on a good set of newer firmwares!
I wonder how they'd feel when their company name appears in an security advisory?
Okay. I built the tool to do it, and linked it here: Hikvision camera admin password reset tool
Impressive!Okay. I built the tool to do it, and linked it here: Hikvision camera admin password reset tool
Those idiots at Hikvision must be seething with rage. Bunch of fools spending time working on ways to brick china cams that users attempt to update but have no time for security updates.Okay. I built the tool to do it, and linked it here: Hikvision camera admin password reset tool
yes, you have no risk.Geez. I found this thread via a thread about the hikvision cube clone (which i just bought a month ago).
I have Ubiquiti Unifi gear. the BI PC is on VLAN2 with no access to my main LAN. My IP camera group on VLAN2 is blocked from access WAN and my main LAN (cannot ping out to WAN or to LAN1). The cameras get their time from my BI PC using the nettime app. The BI PC only runs my cameras.
Does this sound safe? I have not touched the firmware on my 8 cameras in a while.
yes, you have no risk.
they are not...they either have to put a bit of effort into learning how (as you have shown, its not that difficult) or hire someone...those same folks wouldn't dare run electrical wiring themselves....so they should hire someone for this as well..Thanks, I thought so, but good to have experienced confirmation. I also use L2TP VPN for remote access and to not have any open/forwarded/visible ports. All this works great. I'm a networking novice, but I don't know how in the world normal people are supposed to be expected to set this stuff up.