ADI Refuses to Fix Their OEM'd Hikvision Security Risks [Solved]

Author: Brian Karas, Published on Mar 09, 2016

More than a year after massive hacks against Hikvision was disclosed; More than 9 months after Hikvision issued improved security firmware, mega distributor and Hikvision OEM ADI still refuses to fix the well-known security risk.

ADI is still shipping W-Box IP Cameras using the exploited 5.2 firmware, with no option for the improved 5.3 release. We repeatedly encouraged ADI to fix this, with a public notice more than 5 months ago.

ADI's Supposed 'Fix'

ADI did issue what they call a 'patch' but the patch is primarily a pop-up warning, still allowing the weak default password, without the stronger security enhancements that Hikvision has deployed in 5.3.

 

ADI claims they take "cyber security very seriously" but their 'patch' shows otherwise. We recommend users avoid W-Box until and unless they adopt the security measures that Hikvision recommends and that other Hikvision OEMs have adopted.

Risks Publicly Traded Company

ADI is a billion dollar plus division of Honeywell, an American publicly traded company with an $83 billion market valuation.

ADI is buying from a Chinese government controlled company, Hikvision, and continuing to ship software that their Chinese supplier has deemed risky.

Given the increased public awareness of cyber security risks and ADI's refusal to take action for such a long period, this exposes their parent company to potential liability and their customers to security breaches.

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

Background of Hikvision Hacks

These problems emerged in March 2015, when it was disclosed that Hikvision was hacked inside Chinese government networks, following numerous reports of Hikvision being hacked around the world (see: Hikvision Hacking Incidents). Indeed, this generated international news and Hikvision's stock trading had to be temporarily suspended to deal with the crisis.

Upgrade Available 9+ Months Ago

In response to this, Hikvision significantly improved their firmware to close out the most basic and significant risk exposures in their 5.3 release from April / May 2015. Release notes for the 5.3.0 firmware on Hikvisions website note the security improvements.

Below is an example of a Hikvision camera with the improved 5.3 software that Hikvision rates as 'strong' security:

By contrast, the ADI W-Box camera that still only has 5.2 software is reported by Hikvision as 'risky':

ADI 'New' Manufacturer Must Be Responsible

Only in the past few years has ADI tried their hand as a "manufacturer", primarily by OEMing finished goods, ranging from IP cameras to 6 Zone Metal Detectors to piezo buzzers.  

The level of risk, and responsibility, associated with a being a conscientious supplier of network-connected devices like a camera or recorder is high. This requires more involvement than just adding a logo and markup.

Warning to ADI 5+ Months Ago

Certainly, ADI must (or should be aware of this). Indeed, IPVM issued a warning on this in September 2015, to help both ADI, their dealers and end users be aware of this risk. We contacted ADI's President four days ago and they say they are working on a response but no details have yet been shared.

Security conscious companies would have a ready answer to questions regarding 9-month old security vulnerabilities, if not an actual fix.

Risk for ADI Cameras To Be Insecure For Years

Firmware upgrades after installation, especially for budget-oriented products like W-Box, are rare. The "if it ain't broke, don't fit it" rule is the mindset here, though in this case the cameras are technically "broken".  Customers with W-Box product may not realize the attack surface exposed via the W-Box cameras, each one being a tiny exploitable computer on the customer's network.  In the past, Hikvision NVRs have been hacked to become pitiful bitcoin miners, hacked cameras could be put to similar tasks, potentially reducing their functionality.  It would even be relatively simple to have a hacked camera replace live video with stored static images, or upload periodic images to a rouge server.

Because of this, these ADI cameras may continue to leave customers exposed for 5 or even 10 years, potentially to exploits that have not been considered yet.

Other OEMs (Including Tri-Ed) Have Been Fixed

Two of ADI's direct competitors, Anixter's Tri-Ed and LTS, who also OEM Hikvision, have fixed / upgraded to the 5.3 firmware. While Hikvision has myriad OEMs, and it is impossible to verify all, these cases show that others in similar situation have been able to resolve this.

OEMing Hikvision Adds Bullseye

Because Hikvision is the largest supplier of cameras in the world, and ADI is one of the largest distributors in the world, this makes their devices quite attractive for hackers to target, not only because of the widely known flaws but the sheer mass of these cameras deployed.

----

UPDATE March 11 2016:

ADI responded stating they had created a patch for 5.2 with security fixes, that response unedited and in full is below:

ADI takes cyber security very seriously and we stand behind the products we sell.  We release firmware updates as security impacts are identified and patches are ready for release by manufacturers. In fact, we received the 5.2 corrective patch from Hikvision in December 2015, and immediately made it available to customers on the wboxtech.com website.

In response to your questions:

1) Is there any reason that current or recently shipped (last 9 months) W-Box cameras cannot be upgraded to 5.3?

The Wbox equipment can be upgraded via firmware upgrade. The 5.2 security patch, which is the basis of your article, was released and posted to thewboxtech.com website in December. If the patch had been installed in your camera, and your password configured as the patch recommends, the camera would reflect strong security. 

2) What is the rationale for staying on 5.2 instead of upgrading to 5.3?

5.3 is a version release that included new features as well as a security upgrade. We elected to issue a patch to enhance security. 

3) Does ADI intend to offer 5.3 (or a newer version if in the works) within the next 30 days? 

ADI consistently reviews our product line and  incorporates new product features regularly.

4) Does ADI have, or plan to incorporate, a plan or policy for staying up to date with future firmware releases for W-Box? 

We release firmware updates as security impacts are identified and patches are ready for release. The security patch for this issue was released in December, when we received it. 

Michael [ADI President]

Our findings show that this W-Box firmware does not enforce the same security as Hikvision's own 5.3 firmware:

We downloaded the current firmware from http://wboxtech.com/firmware/IPC-firmware.zip and installed this firmware on a W-Box test unit.  

 

We have reached out to ADI for additional clarification and will update with any response.

UPDATE March 16, 2016

We have not received any additional followup from ADI, despite multiple attempts and questions to them.  The security in ADI's patched 5.2 firmware release is still weak and reflects a poor effort on ADI's part to take "cyber security very seriously".  Users of W-Box cameras should take additional precautions to avoid having cameras directly connected to the Internet.

UPDATE June 2, 2016

ADI has finally fixed the issue, upgrading to 5.3. Here is the new instructions and the 5.3 firmware.

This clip shows the activation process now required in the web interface, rejecting the old default password of "wbox123", requiring 8 characters and special characters.

2 reports cite this report:

Hacked Dahua Cameras Drive Massive Mirai Cyber Attack on Sep 27, 2016
Cyber attacks are accelerating and IP cameras are behind many of them. Worse, last week, a 'massive' attack was carried out using numerous Dahua...
ADI Finally Fixes Hikvision OEM'd Security Risk on Jun 09, 2016
After refusing for months to fix the obvious security risks, ADI has given in and fixed it. Two important lessons here: ADI knows little about...
Comments (13) : PRO Members only. Login. or Join.

Related Reports on Hacking

April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
TVT Backdoor Disclosed on Apr 09, 2018
Security researcher Bashis has disclosed a backdoor in TVT video surveillance products, with TVT issuing its own 'Notification of Critical...
P2P 'Fail To' 'Quick And Steady Access' - Hikvision Defends Port Forwarding on Apr 02, 2018
Following criticism of Hikvision's ongoing port forwarding recommendation (e.g., Hikvision Hardening Guide Recommends Port Forwarding and Hikvision...
Stats: Disclosing Vulnerabilities Responsibility? Researcher or Manufacturer on Mar 30, 2018
Getting prompt and appropriate information on vulnerabilities is important for integrators and end users to ensure that their systems are best...
Hanwha / Kaspersky Vulnerability Dispute Examined on Mar 29, 2018
IT media ran numerous reports in the past month featuring two prominent companies - Hanwha (previously part of mega manufacturer Samsung) Techwin...
Hikvision HQ Contradicts Cybersecurity Director on Mar 07, 2018
Hikvision HQ has contradicted Hikvision USA's Director of Cybersecurity, Chuck Davis. Davis - Don't Put Cameras On The Internet Davis made a...
New Whole Foods Installs Hackable Access Control (Upgraded) on Feb 21, 2018
Whole Foods has built a reputation for high quality. And their 2017 Amazon acquisition has increased that, plus added deep pockets for buying...
Remote Network Access for Video Surveillance Guide on Feb 21, 2018
Remotely accessing surveillance systems is key in 2018, with more and more users relying on mobile apps as their main way of operating the system....
IP Cameras Default Passwords Directory on Feb 09, 2018
Below is a directory of 50+ manufacturer's default passwords. Note: Change Default Passwords Leaving default passwords is dangerous and makes it...
Simplisafe 'All New' Generation 3 Tested on Feb 08, 2018
Feared by the traditional alarm industry, Simplisafe has launched its 'all new' Generation 3 platform that they declare is "Stronger. Faster....

Most Recent Industry Reports

Global Real-Time Video Surveillance - EarthNow on Apr 20, 2018
A new company, EarthNow, with backing from Bill Gates, Airbus and more, is claiming that: Users will be able to see places on Earth with a delay...
Dedicated Vs Converged Access Control Networks (Statistics) on Apr 20, 2018
Running one's access control system on a converged network, with one's computers and phones, can save money. On the other hand, hand, doing so can...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
Rare Video Surveillance Fundraising - Verkada $15 Million on Apr 19, 2018
Fundraising in video surveillance (and the broader physical security market) has been poor recently. Highlights are few and far in between...
'Best In Show' Fails on Apr 19, 2018
ISC West's "Best In Show" has failed. For more than a decade, it has become increasingly irrelevant as the selections exhibit a cartoon level...
Security Camera Cleaning Frequency Statistics on Apr 18, 2018
150+ integrators told IPVM how often they clean cameras on customer's sites and why.  Inside we examine their answers and break down feedback...
Worst Access Control 2018 on Apr 18, 2018
Three access control providers stood out as providing the most problems for integrators. In this report, we analyze the answers to: "In the...
Axis VMD4 Analytics Tested on Apr 17, 2018
Axis is now on its 4th generation of video motion detection (VMD), which Axis calls "a free video analytics application." In this generation, Axis...
Arecont CEO And President Resign on Apr 17, 2018
This is good news for Arecont. Arecont's problems have been well known for years (e.g., most recently Worst Camera Manufacturers 2018 and starting...
Strong ISC West 2018, Says Manufacturers, GSX / ASIS Expected Weaker on Apr 17, 2018
Manufacturers say ISC West 2018 was strong, continuing the trend we have seen in 2017 results and 2016 results. However, those same 100...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact