ONVIF Exposure To "Devastating DDoS Attacks" Examined

Published Sep 06, 2019 13:12 PM

ZDnet reported "Protocol used by 630,000 devices can be abused for devastating DDoS attacks", citing exposure of ONVIF devices.

soap ONVIF issue_2

And after an IPVM discussion asking about ONVIF being 'dangerous', Verkada launched a Facebook ad declaring that:

IPVM investigated the vulnerability, speaking with the researcher, examining:

  • What the risks are and how severe it is for ONVIF devices
  • How the vulnerability works and what conditions must be met
  • ONVIF response to vulnerability
  • Input from the researcher
  • Potential for abuse
  • Mitigation steps

Executive *******

*** **** ** ********** ***** ***** is ********* *** ** ** ******** a *********** ** ******** ******: (*) a ******, ***-********, **-********* ************** **** (2) ******* * ***-********, ******** **** to *** ****** ********.

** *** ***** ****, ******* **** meet **** ********** ** ********* * threat ** ***** *********** **** ** DDOS *******.

No ******* ** ****** ** ******

** ******** ***** ***** *** ** able ** **** ******* ** *** device, **** *****, ****** ** *****, etc., **** ** * ****** ***** both **********.

Faulty **-********* ******** *** *******

** ***** ** ** ********** ** this *******, ******* **** *** * faulty **-********* ************** ***** ****** ********* to ** **** **** *** ********.********* ** **-*********'* **************, ** **** ********* *** ************* ** ******** **** *** ********:

************, ***** ** ***** ******** ** default ** ******* *******, ********* ****, Dahua, *** *********, ** ** **** be ******** ******* ** ***** *** WS-Discovery ** *** **** *******.

Uncommon **** **** ** **** (***/****)

******, ******* **** ********-****-********** (**** ********, *** *** ***********, used ** *****) *** *** **** 3702 **** ** *** ******** (** uncommon ****).

*** **** **** **** ***** ******** traffic **** *** ******** ** **** attackers *** **** **-********* ********. **** means **** **** **** **** ** forwarded ********, ********* ****, ** ** ******** ********* ** the ******** ******* * ******** ******** ports (*.*., ******** ********* ** * modem).

**** **** ** ********,*** * ****** ****, *** ******** ** ** ******** forwarded ** ****** ***** **** ****** users. ****** ***** ** ** *** which *** ******** ******** *** ****** access ** ******* *** **** ** routers/firewalls, **** ** ************* ****** ******** to ** ****.

UPnP ********* ******** ** *******

************,***** ** *** *******, **** ************* ******* **** ** default. *******, ** ** ******** **** older ********* *** **** ******* **** and ****** **** ****.

Low **** / *********** ** **** ******* ********

***** **** ***** ******* *** ************ rare ***********, *** ** **** ***** true ** ****** ******** ** *** vast ******** ** *************.

ONVIF ********

**** ******* ***** *** **** *********** on **** *******. ***** ******** *****, in *****, **** ** ******* ************* for ********* ******:

***** ******** ********** *** ******* ********* that ******* *********** *** ********** ** physical ******** *******. **** ************ **** have ******** ********* *** ******* ********** to ***** ***** ******** ** ** used ** * ****** ****** ** various ******* ************. ** * ******* rule ***** ******** **** ******** *** use ** ******** ******** ***** ********** security ******** **** ** ***** ** help ***** (******* ****’* *** *********) or ******* ********* (******* *******) ****** to *** ********* **** ** ******* entity. ** ***** ******* ********** ********** ******* **** *********** ***** *** to ******** ****** ***** ******** *** deployment, **** ****** ******* *** ****** manufacturer.

Axis ********

**** ********* **** **** **** ********** their *** ******** *** ******:

** *********** **** ** ** ******** to **** *** ********* **** ****** using ******* **-********* *******. **** ** behavior ** *** **-********* ******. ***** did *** ****** **, ***** **** specified ** *** **-********* ** ******** deployment.

*** ****** ** ******* ******* *** the ********** ** **** ****** *** always ** **********. ** *** ****** are ******* ** ** ********** - not **** *** ****. ** *** various ******** ** ****** *** ****** of ********-****** ******* ********* ********* ***** and ****** ****** ***** ****** (**** Companion). ** ******** ********** ********* *** partners ******** ******* ** ********.

Manufacturers ********

********* ** ****** *******, *** ********** quoted ** *** ***** *******, **** percentages ** *** ******** ******* ******* he *** ***** *** **** **** and *****. *** *** ******** ******* that ****** ***,*** ***** ******* ******* to ******** *** **** *** **** 3702. *******, ** ***** *** **** such ******* ** **** ******* *******. We **** *** ********* ***** ******* are ********** ** ********** ** ****** WS-Discovery ********, *** ******* *** ****** multiple ******* ***** ** ***** ******** and *********.

*******, ** *** *******, ******* ***** models ** *** **** *** ******* by *******, *** ** **** **** with ***** *******.

Exploit ********

****** ***** ******** ** **** ******* were ********* ~*** ****, *** **** recently, ******* ** ***+ **** **** seen. *** *********, *** **** ** approaching *** ********* ** *** **** which**** **** ***** ** ******** (*** Gbps)*** ***** ** **** **** ***** took ********** ** **** (*.* ****), *** ******* **** **** ********.

** *** **** ** *******, ***** were ***,*** ****** ****** ******* **** UDP **** **** **** ********** ** "ONVIF" *******, ***** *****:

*** **********, *******, **** ** **** many ** ***** ****** ********* ********* to **-********* ******* ****. ** **** says **** ******* * ***** ******* often ****** * **** ****** ********, with ************* ** **** ********.

Potential ******

****** ******* ************* *** ******** ** be ********* ***** **** *************, ~***,*** rogue ******* **** *********** ********* *** misuse. *** *******, *** ***** ******, which ********** ******** ~***,*** ******* ** attacks, *** **** ****** **** * *******'* ********,******* ******, *** ****.

**********

*** ********** *****, ***** *** *** basic ***** ***** *** ** ***** to ****** **** *** *** ********** to **** *******:

  • ******* ****:******** **** ************* ******* **** ** default, ** *** **** **** ******* by ******* ** *** ***** ********.
  • ****** **** **** ** ******:***** ****** **** **** **** **** UDP **** **** ** ****** ** their ****** ** ******** *** *** allow ******** ******* ** **** **** to *** ********.

*** ***** *** *** ******* ** not ******* ****** ** **** ***** changes, ********** *** ********* ****** ** these ******* **** ****** **** ** ISPs, ** **** *** ****** ** block ** **** ***** ***** ********.

Comments (24)
UM
Undisclosed Manufacturer #1
Sep 06, 2019

* ***** **** "*** ****" ******* the **** **** **** **** ***** 627 ******** ******* ** *** ******** doing ****, **** *** ******** **** report ********** ** ***** ******.

* ****** *** ******** ** ** cameras ******** ******* ** *** ********, but **** ****** ** ****** ** block. ** *** ****** **** ******** to ******** ** *** ********* *******, then **** ***** ** **** ****** for *** ******** ** **** *** packets.

(4)
JH
John Honovich
Sep 06, 2019
IPVM

* ***** **** "*** ****" ******* the ****

*** **** ** ****** *** **** ONVIF *******. *** ********** **** ***'* ONVIF ****** ** **** ** **** pool ** ********* *** ******* ** this ****** ******** ************.

**'* ********* * ****** **** ** targets **** ***** ** *** ***** these *******.

(2)
(1)
UI
Undisclosed Integrator #2
Sep 06, 2019

* ***** *** ***** *** **** to *** ** ** *** **** because ** ******* ********** ************ *** access ** *** ****** ******; *** vulnerability ** ***** *** ***********. **** everything ****** ****** ***** ***** ****, and **** *** ******* ********** ********* of *****, *** ****** **** ** a ****** ****** ***** ************ ****** being **** ** * ****** ** extremely ****.

********* *** **** ** * ************* based ** ** ********** ******-**** ** experiencing ** ** ***** *******. ** would ** **** ** *** ******** about * ******* ************* ****** ******* you **** **** * * ** 10000 ****** ** *** ******** ******* being **** ** ****** **** ********. You ***** **** ** **** ** seriously *** ******.

**** ** **** ******* ******* ** the *** ************* ******. *** ***** everyone ****** ** *** * ****** protocol, ***** ****** ********** **** *** could ***** *** *** ****** ** attack * ******.

JH
John Honovich
Sep 06, 2019
IPVM

*** ****** **** ** * ****** facing ***** ************ ******”

*** *** *** ********** ** * publicly ****** ***** ****** ** *** specific **** ******, **** ** ************ recommends ** ***, ** **** ***.

(4)
JH
John Honovich
Sep 06, 2019
IPVM

********* *** **** ** * ************* based ** ** ********** ******-**** ** experiencing ** ** ***** *******.

**, **’* **** ***** ***** ***** does ***** ***. ***** *** * vast ***** ** ***** ***** **** you **** *** *** **** *** most *** *** *** *** *** safely ******.

** **** ****, ** ** ***** to *** **** *** *** ******** to *** ******** *** ** *** extraordinarily **** **** **** ** ****, close **.

(3)
UI
Undisclosed Integrator #2
Sep 06, 2019

********** ** **** ********** **** ** this, ** ** ***** * ****** concern, *** ******* **** * ******** product ** ***** ******* ***** ** make **** *** **** ** *****. The ****** ******* ** ***** ****** with ****** ************* ** ******* * higher **** **********.

(3)
U
Undisclosed #3
Sep 06, 2019

******** * *** *** *** ***** to ***** **** ***, ***** ** was ********* ** * ******** ******, I ******** **** ******** ** ****** ***** *********?******:

Why **** ******* (** *** ******) **** ~**% ** *** ******* *******?

*** *** *****'* ****** *** ** (and *** ******** ******) ***** **** is ******* ****** ** *** *** find *** *** **** **?

UI
Undisclosed Integrator #5
Sep 06, 2019

*** *** *** ******** **** **% figure? ********* ** ******, *** ***** results *** ***** (******** *** **** 3702) ** ***,***. *** ***** *** Vietnam ** **,***. ****'* **%.

*** *** ***** ******* **** ********* else?

**** ** ** ** **%, ******, I ** ***** **** ** *** that ******* *** *** ******* **********.

U
Undisclosed #3
Sep 06, 2019

* **** *** ******* **** *** graphic ****** ******* *** *** ** the **:

*** * **** * ********** ** get *** ****** ** **.************** ([***,*** x ***] /***,***) - *** *********** that ** ~**%.

Avatar
John Scanlan
Sep 06, 2019
IPVM • IPVMU Certified

*** ******* **** ******** **************.

Avatar
John Scanlan
Sep 06, 2019
IPVM • IPVMU Certified

*** ****** ** *** **** ** the ******* ** *** *** ****** of ******* ** **** *******, ** is *** ****** ** *** *****:

(1)
U
Undisclosed #3
Sep 06, 2019

***.

**** **** *** ******* ****** **** to ******** ********* ** *** ******* column ***** ********* ********** ******* ******* in **** *******?

U
Undisclosed #4
Sep 06, 2019
IPVMU Certified

******* ******** **** **** **** **** all *********.

** ***,*** ** *** ******* **** port **** **** **** ***** *******, based ** *** ****** ********.

U
Undisclosed #3
Sep 06, 2019

**** *** *** *** ** *** other ***** ********** **** ****** '*********'-***** numbers **** ******* '********'-***** *******?

U
Undisclosed #4
Sep 06, 2019
IPVMU Certified

**** *** *** *** ** *** other ***** ********** **** ****** '*********'-***** numbers **** ******* '********'-***** *******?

******* *** *** ********* *** *** shown, *** ****, ** *** ***, products ***, **** *** ** ********** order.

****, *** *** **** *** **** of *** *******, ******** **** *** line *** *****?

Avatar
John Scanlan
Sep 06, 2019
IPVM • IPVMU Certified

**** *** *** ***** *******. * am *** **** **** ********** ** query/response ** *** *********** ** ******** them **** ********* ******** *** **** are *** ***** ******* **** **** 3702 ****.

**** ** ** ******* ** ** ONVIF ****** **** * ** ** the *** *********:

"******* **** ******" **** * ****** to *** *********:

*** **** ** **** ** *** other ******* **********. * ** ******** they ****** ** ***** ********** *********** between *** ******* ********** *** **** emailed **** *** **** ******** *******.

U
Undisclosed #4
Sep 06, 2019
IPVMU Certified

***** **** ***** ******* *** ************ rare ***********, *** ** **** ***** true ** ****** ******** ** *** vast ******** ** *************.

*** **** *** *** **** ** at ***** ***,*** *****, *****?

U
Undisclosed #4
Sep 06, 2019
IPVMU Certified

*** ******** ******** ******* ******* *** why *** ******* ********** ** ***** at **** ******* *** ** *******?

********, ******* *** **** **** * hundredth ** *** ******* ** *** U.S. *** ***** ******* ****, *** here ** *********** *** *.*.?

***, **’* *** ******** ** ** chance. ******** **** *** **** *** in ********* *** *** ** ******* threat **** **.

(1)
(1)
UI
Undisclosed Integrator #5
Sep 06, 2019

***** *****'* *** ********* ******* ********** who *****'* **** **** ****'** *****? Maybe **** *** * ******** ** routers *** ***** ** ********** * lot ** ******* ******** ** *** Internet?

* ****** ** *** *** ********* dampen *** ******* ** * **** by ******** *******.

(1)
UM
Undisclosed Manufacturer #6
Sep 06, 2019

******* ***** ********* **** *******, *** Devices, ***. ***** ***** *** *** devices **** *** ***** **** ****. Maybe ** *** ******* ** ** with *****, ****** ** **** **** port *** ******* ****. ***** ***** are ***** **** ******* *** **** the ***** **** *** *** ******* in ***** ******* ** *** **, etc... *** *****....

U
Undisclosed #3
Sep 06, 2019

"*** *****...."

***, *** **** ** * ****** cavalier **********, **?

*** *** *** ********* **** **** anything ** *** ** *** **** itself ** ************ ***** ** *********** reasoning?

SH
Slava H
Sep 06, 2019

****'* **** *** ******* ** **** Onvif ***** ********* ******* ** *********** to *** *** ****** ******* *** DDOS.

***, *** *** **** **(**** ** death ******!) ** ********* ** ****. DNS *** **** *** *** ***** can ** **** *** ****. ** here ** **, ***'* **** ***** DNS *** *** *********** *** **********.

(3)
U
Undisclosed #7
Sep 06, 2019

** ******* ****** **** ***** *******, and ***** *******, *** *** ********** to *** **** ** **** ******?

** **, *** **** ** **** mind ** * ****** ****.

(3)
(1)
(7)
JH
John Honovich
Sep 21, 2019
IPVM

******:**** ****** * ******** ******** ** this, ******* ********* *****:

***** **** **** *** ****** ** limited, **** ************ **** **** *** susceptible:

*** **** ******* **** ******** ***** are *********** ** *** ********* ******. WS ********* ** ******* ** ******* regardless ** ***** *** ** **** or ***.

*** **** **** *** ********** ****** firmware ******* *** ****:

**** ** ************* ********* ** ********* behavior ** ****** **** ** **** 3702 ** *******. ** *********** **** be ****, **** **** ** ********* in * ****** ********* ******** *******.

** **** ****** ** **** ** here.

(1)