ADI Hides Dahua Relabeled Capture Camera Critical Vulnerability [Now Issues Notification]

Avatar
Avatar
Rob Kilpatrick and Ethan Ace
Published Oct 08, 2021 13:12 PM

ADI's Dahua-relabeled Capture cameras are vulnerable to a critical vulnerability, IPVM has verified. However, ADI has not notified users nor posted instructions to patch them plus ADI management refused to respond to IPVM.

IPVM Image

In this report, we examine the details of these vulnerabilities, proof of concept showing they are vulnerable, response from ADI management and tech support, and how relabeling impacts cybersecurity.

Update, more than 3 months after Dahua was informed and a month after Dahua disclosed publicly, ADI has issued a statement copied primarily from Dahua's statement:

IPVM Image

ADI ******* ********

******* ** ***'* ****** "***** *****" of ************ *********, ******** ******* ** 2021, ********** ** ********* ***** ******* and ****, ******** ** *** ********* ******** ******** *****.

******* ** *** ********* *****'* *-*** *****, ****** **** ***** ***** **** line, ** ****.

Dahua ******** ************** ****** ***************

** ********* ** *** ****,*****'* ******** *************** (*** *** ******)*** ** *********:

...****** *** ***** *******. ********* *** bypass ****** ******** ************** ** ************ malicious **** *******.

*** *** *************** **** ******** ** how **** *** *********, *** *** conceptually *******.******' ********************* **** *******.

*** **** *** ****** **** *************** as *.*, ***** ** ******** ******** according ******** ************* ******* ****** (****) ** metrics(******-****-***********-****-*****).

ADI ******* ************* ***** ** *******

******, *** ********** *** ********** *** Dahua ******** ***************, *** ******** * proof-of-concept (************ ** ******) **** ****** ******* ******* *** vulnerable.

** *** ******* *****, ** *** the ****** ** ******* ** * Capture **-******** ****** ** *** *** network, **** *** "*******" ******* ****** indicating **** *** ****** ** **********. In **** ****, ***-****-***** ("***********" **** bypass) *** ****, ****** ******* *** similar ***** *** ******** *************.

IPVM Image

*** ******* ****** **** ** **** example ** ******* ******** **.***.*******.*.*, ***** Date: ****-**-**.

** ********, ***-********** ******* ****** **** "Failed" **** ********** ** *** *** script, *.*., ** *** ******* **-**-**** firmware ** **** *******.

IPVM Image

Low ********** ******** ********

******' ***** ** ******* **** *** further ******* *** *******, *** ***** this ************** ****** ** ****** ******** on *** ******, ******/****** *****, ** disable ** ******** ** *** ********** and ******** ******* *********** ****** *** even ********** ******* ******** *********.

No ************ ** ***************

***'* ******* ************ ** *********** ********* ***** ****** vulnerabilities, *** **** ** (** * purchaser ** ******* *******) ******** *** notification *** ***** ** *********. ** asked *** ** ************* **** **** or ********* ********, *** **** **** not ********* ** *** ******* *** comment.

ADI **** ******* *******

**** ** ********* *** **** *******, no ***** ** ***** ** **** aware **** ******* ******* **** ******** by ***** ***************. *******, **** ** asked ** ******* ******** *** *********, one **** ******* **** **** "***** it" *** **** **** ***** ***** the ****** ******** ** **, ***** we **** *** *** ********.

Firmware ******* *** ******

*** **** ******* **** **** **** are "******* **" ******* ******** ******, though *** *** **** * ******** for ********** ****. ** ** **********, the **** ******* *********** ********* *** Capture ** ***** ** *** ****** of*** *** ***** ****, ********** ****** ** * ******* form *** ***** ******.

No ******** **** ***

*** ********** *** *** ******* ** requests *** *******. **/**** **** *******, we **** ****** **** ******.

Trust *** ********

***** *************** *** *** ****** ** a **** ********* *** ** ***** *** *** product ***************, ***** ************ ********** ******* **** ****** ********* chips,************ ****** ********* ***** *******, *** *********"******** **" ** ***** ***** **** were ********** *** ***** ****** ******.

Relabeling ************* ****

******* *******' ************* *************** ********** *** of *** ***** ***** ** **********. Since ***'* ***** ** *** ********* in ***** ***** ***************, *** **** to ***** ***** ** **** *****, making ** **** ****** **** **** will ** ********* ** *********** ****** firmware *** ****** ***** ** ***** potential ******** *** *****.

*******, ** *** ****** **** ********** shown, ********** ***** ******* ** ********** devices ** ***** ** ***** **** them ********* ** **** ** *** public, ** *********** ******* **** **** used ** ****** **** *******,******* ********** **** ****** ******** ******* *******.

Comments (11)
AM
Andrew Myers
Oct 08, 2021

IPVM Image

(1)
(1)
UD
Undisclosed Distributor #1
Oct 08, 2021

*** **** ** ***** ***********, ** should ** *******

(1)
(1)
UI
Undisclosed Integrator #2
Oct 11, 2021

** *** **** ********* ** ****, anymore? * ****, *** ****** **** are ********* **** **** **** ** vulnerability ******** ****'* ****** ***-**** ******** from ***, ******. *** *** ****** that ****'* ********* **** **** *** probably *** **** ************ *****-******** **** aren't ******* ****, ******, *** ******'* care **** **** ******* ****, ** they *** **** **. *** **** is **** ********** **** *** ** still ***. *'* *** *********, *** I **** **** *'* ******** ** the ********. ****** *** *** *******, though.

JH
John Honovich
Oct 11, 2021
IPVM

***, ***, * *** **** *******.

* ** ******* **** *** *** and ****** ** ****** **** ****.

*** ********* ** ****** *** **** of ********** ** *** ****"**** ** ************ ****** *** ******** security ** *** ****** ****** ** the ******** *** ****** ** ****** States *******" **** **** *.* *************** that **** **** *** *****.

*** ***** ** *** ***** ** ADI **** *** ****** *** ** held *********** *** ****?

UI
Undisclosed Integrator #2
Oct 11, 2021

** *** ********, * ** *** need ** ***** ****** ** *** to ******* **** ****** ** **** accountable. ** ** *****: * ***** ANYONE ********* ****** *** **** ** devices*** ** *** ****"**** ** ************ **** ** *** national ******** ** *** ****** ****** or *** ******** *** ****** ** United ****** *******" ****** ** **** accountable. ******* * ***** ****** ** them, ** ***.

** **** *****'* ******** ** **** ADI *** ******* ** **** **** of ********.

JH
John Honovich
Oct 11, 2021
IPVM

*** ******* * *** **** ** ********, ** *** ****** *** ******* responded, ****** **, **** *** ****** not *** **. ****....

IPVM Image

JH
John Honovich
Oct 13, 2021
IPVM

******, *** *** *** ****** * notification, ******* ****** **** *****'*:

IPVM Image

(2)
UI
Undisclosed Integrator #3
Oct 13, 2021

* ****** *** **** ** ** had ** ** **** **** *******.

** *** ** ********** *** *** OEM *** * ************* **** ****** be ******* ** *** *** **** through *** ***'* ******** (***, *** example, *** *** ****** *** *** OEM **), **** *** ********** *** a ************** ** *** **** ****** ASAP *** ***** *** ********.

**** *** * ******* *** ** when **** **** ****** *********. ** bought * ***** ** ***** *-*** IP ********* ***** *** **** ********* Hik ***, *** ** *** ***** uploading *** ******** *** ****** ***** just ****** ** ****** ** *** incompatible.

(1)
bm
bashis mcw
Oct 13, 2021

* ****** *** **** ** ** had ** ** **** **** *******.

** ******** ******* ** **** **'* 95% ****** ** **** ******* *** IPVM, *** ***** *% ** ** can ******** ** ****** ** ** PoC - *** ****'* **** ** main ****** *** ********* ******* ***.

(1)
JH
John Honovich
Oct 13, 2021
IPVM

** ***** *** **** ******** ** without ****** ***.

*** ****** *** ***** **** ********** updated *** ******** *** * ** think ** ******* ********* ** **** helped *** ***** (****** * ***'* see *** ****** ** *** *** did *** ****** ******** ****** ***** Dahua ******** ********* **** **** **** a ***** ***).

(2)
UD
Undisclosed Distributor #1
Oct 13, 2021

*** ******** ** ***** ******** *********, a ***** *****+ ** *************, *** at ** ********** ******. /*

(2)