Arecont and Bosch - Default Security Risk

Author: IPVM Team, Published on Dec 14, 2015

Default passwords are a major security risk, enabling hackers around the world to access and control devices like IP cameras (using Shodan, turning devices into bitcoin miners, etc.). Because of that, many manufacturers now force changing the default password and using strong passwords.

But two very well known manufacturers, Arecont and Bosch, continue to take the opposite, risky and irresponsible route.

******* ********* *** * ***** ******** ****, ******** ******* ****** the ***** ** ****** *** ******* ******* **** ** ******* (using******, ******* ******* *********** ******, ***.). ******* ** ****, **** ************* *** ***** ******** the ******* ******** *** ***** ****** *********.

*** *** **** **** ***** *************, ******* *** *****, ******** to take *** ********, ***** *** ************* *****.

[***************]

*******

**** ** *******'* ********:

"******* ****** *******do *** **** **** ************** *******. To enable authentication, access the web interface of the camera and click either the 'Administration' or 'System' tabs. Passwords can then be configured for the Admin and Viewer user names. Note that custom usernames cannot be created, only the 'Admin' and 'Viewer' user names are available for usage.

******** ****limit ** * ********** MAX with letters and numbers only. No ******* ******."

*** **** *** ****** ****** ** ******* ****** ****** * user ********** ******* **************, ******* ***** ** **** ** *** up * ****** ********.

*****

***** **** ***** **** ** ************** *** **** ***** ** as * ****** ** * ******* '*** ***** ********* ******'************:

"** ***'* ******* ******* ******** ** *** **. ** **** telnet ****.... ***** ***** ** ******, ** *******, ***** **** you *** **** *********** ** ** *********."

**'* ********* ********, **** ******** * ***** ******* ******* *** locks ** *** *****.

UPDATE: ***** ********

******** ** *.** ********, ***** ******* ***** ** *** * password, **** **** ***** ********* **** ********** ** *** ******'* web *********. **** **** ** ******** ** *** ** ******* and **** ** ********, ****** ******* ** *********, ***** ***** users ** *** ***.

******** ** ***** ***** ** *** ******** ***** ****, **** a ***** ******* ******** "********." **** **** *** ******** ** this ******* *** * ********** **** *** ******** ********* *** lowercase *******, *******, *** * ******* *********, *** *** ***** only ******** ** "******." ****** ********* ******* ** ********** *** a *** ** ***** *****.

*******

*** ******* **** ********** ** ** ************** ** **** **** users *** *********** **** ***** *** ** * ******** ** not ********. ** * **** **** ****,**** * ***** ** ***** **** **** ***** ********* ********* ****** ** "**** ** *** time."** ******* ****, * **** **% **** **** ************* ****** ** ******* to ***** ****** *********.

**** ** **************/******* ********* *** ** ****** **** ** ******** incidents ** *** **** *-* *****, **** ******* ************ ********* ******* *******, ** ***** * ******* ********'* **** **** ******** ******** and ***** ****. *** ** *** ******** ******* *****, ********* consumers, ** **** (*** ** ****** ******** - ************* ******** *** *,*** ****** ************ ******* - * *******).

***** ***** **** ******* *********, *** **** *********** **** *******, *******, *** ********** ***** ** ******** ******** ** *** **** ****, ******* and *****'* ******** ***** *************, ** ****.

****

***** ***** ******** *** *** **** *********** **** ******** ****, Arecont *** ***** ***** ***** ********* ** *********** *** *********** competitive ****.

Comments (7)

**** * ***** ************* ******** ** ******** ******** *******. ***** devices *** ** ****** ** * ***** ** ****** ********. They *** ******* **** *** ** *** **** ** **'* network *** **** **** ** ********** **** **** **** **** may ** *** ****** ******* **** ****** ** *** **** video, *** *** **** ***-******* ** *** ******* ******* **** attacks. * ***** ***** ****** **** *** **** **** "******" the ******** ** **** *** ***** ** ********** **** ******* a ******** ***** ** (**** * ******* ****) ** * good **** ******* *********** **************.

***** *** ******* - *** * *****. **'* *** **** hard ** ****** **** ***** ******* *** ******** ** ****** tight ******** ** **** *******. ***** ** **** *********, *** your ****. ** **** ***'* **** *** ****** ** *********** to ****** *** ******** *** ****** ** **** ** *** bench *** ****-**, **** *** *******'* ** ******* ** **** in *** ***** *****.

****'* *** ****? **** ***** **** **** - ***'* ***** that ******* ***** ********** *** ****. *** *** ****** *** hacked * *** ***** **** - ** **** *** **** wasn't ******* *** **** ** ** ******* ******. *** **** VARS ******* *** ** ***** ****** ** *** ******** ********?

* ******** ********* **** ****** ******** ********** ** ******* **** IP ***** ******* *** ****** *********** ********* ** ****** ***** devices *** ********* ** *** *** **** *********'* ***** ************* to ****** **** ***** ********* ********* **** *** **** ***** end ********* *******.

*'** **** **** ******, *** ******** ******** ******** *** *** to *** **** *** *******, *****. **** ******* ***** *** it, *** **** *** ***** ******* *** ** ** ********** - **** ** *** ***-***** *** ***** ******* *** **** in *** *********** *** ********** *********** ** **** ***-*********, **** and *********. ** **** ** **** ** **** *** ************ of * ****** ********* ************.

***** ******* **** ** ********* **** ** **** *** ******* is *** *******. *** ******* ** * ****** ******* **** needs **** *** *******. ***'* ***** ****** ** ** *** name, ******** *** **** *** ** ***** ****** ***** ******** by ********** *** ****** **** ***** ***** *** **** ************.

******** **** **'* ****, * ***...

****, * ******* **** ******* *** ***** ******* ********:****** * ******* **********. **** *** *** ********* **** *** to**** **** ********, *** ** ** ****** *************** ********.

** *** ****** *** ******, ******* *** ***** ********* *** viewing ** *** ***** ****:**** ** *********.

* ***'* ******* **** ***** ***** **** ****** ****! **** is *****.

* ** ******* ** **** ******* **** *** **** **** allowing *** ** ************** ** ******* ** * **** ****. Here ** *** ***:

**'* * ***** ******** ** ****, ******* **** ** *** know ***** *** ***** ******* ********* *** **** *** *** easily **** *** ** ********.

***** ** ** *****, *** *** * ****** ** ********* this ***** **** * **** **. *** "*** *****" **** does *** ****** ** **** ***** *** ****** **** *** well ****** ***** *******. * **** *** ***** ******* ** the ************ *** **** ******* **** **** ** **** *** make ** **, **** ** *********. ** (******* ****** **** have **** ** *** ******** ******** *** **** **** **** minutes) *** ***** ******* ** *********, ********** *** *********** ** IP ******** ****** *** ** **** **** ***** ** *** quite **** ****. ** ** *** ***** ** *********** ** you ***** **** *** ***** *******. *****, ** ***'* ***** it *****, ** **** ******* ** *********** *** *** ** is ********* ** *** ******. * ** **** ********* **** there *** ****** ** ****** ****** *********** *** ********* ****** passwords. * ** ******* ** ********* (******* * **** *** entire *******) **** *** ***** ** ****** *** **** *** HVAC ****** ****** *** ********** **** ** *** **** ** their ***** *** **** *** **** ** **** **** ****** overworked. **** ****** *** ****** ** **** *********** *** **** happens ** ***** ******* ****** ****? ** ** ***** *** within ***** **** ********** *** ** ***** ** ***** ***** to ****** **** ****** *** ***** *********** ** ********* ***** customer ***** ******* *** ************ ** ******** ******* ** ***** vendor. ****** **** **** ***** **** *** ** ***** ******* vendors ** ******, ********* ** *********, ***** **** ***** ***** responsibility ** ******** *** ******** ** *********** *** *** *********** so **** ***** ********* *** ***** ***** ** ***** ******, which ** ********** ***** ***, *** **** **** ***** *** their ************.

* ** ******* ***** **** *********** *** *********** ********* (**). IA ** ** ***************** ***** ********* ********** ** ** ** an ***************** ***** ********* ********* ** ********, **********, **** **********, fraud ***********, ******** *******, ********** *******, ******* ***********, ******** ***********, and ***********, ** ******** ** ******** *******. ***** ** * perception ****** ** **** **** ***-***** *********** *** ******* **** men *** *** **** ************** ********* ** ******** ***** ***-***** concepts, **** ** **** ** **** ************ **********, ***** ** fact, ** **** ** ***** ******. ** *** ** *** not **** ** *******, *** *********** ********** *** *** ****** security *** ** **** *** ***** *** *** **** *** network.

* ** **** * ****** ******* ** **** ********** **** any ****** **** **** *** **** ** *** ******* ***** certification ** ****** *** ******* ***** ********* ****. **** ** those *** *** ****** ****** *** ******* ******** ********* ****** meet * ******** **** ***/*** ***** ********* ****** *** ******** of *** ******** ** ********* *** ******* ******** ******** *************. Where ** *** *******?

*** ***** ********** **** ** *** **** ***** ******? ** be ****. * ********** **** **** ********** *********** **** ******* security, ************ ****, ******* *** ** *** ************** *** *******.**** ** ** ** *** ********* *******.*** ** ** ***** *** ****? ** **** *** *********** fault? **** ** **** **** *** ********? * **** **** this *** *****, *** * **** **** ** ** **** board; ****** *** ***** ***** *** **** ****** ********* ******* (and * **** ** *** **** ** **** ** ******** codes - *** ***************) ***** ** ** *** ** *****.

***** **. *****, *** * ********* ** **** ******* *** sir, *** **** "*******" ***** * *** ****** ** **. But **** ***** ** ****** **** *** ***** **** * broad *****.

**** - * **** ** *******. *'* ******* **** ** "broad *****" ** ** ********** ** ** ******** *********** **** VARS *** ***********. * **** *** **** *** **** **** the ***** ** ** ***************. *'* ******* **** *** **** had, ***** **** **** ********, * ****** **********. ** *** whether *** ******** ** ** ** ***** (*** *** *****) - *'* **** ** ******** ********.

* ******* **** ******* (*************) **** * ************** ** **** their ****/********** ** *** ***** *********, *** ** ***** ****** than ** ******* *** ***-********.

***-*-*** ** (*********** *********), **** *** ******* ******** ** *** Manufacturers. **** * *** ** *** ****** ******** ** ******* camera ********* ** *** ******* **********, *** ******** ****** **** up, "** **** ******* ** *********?" - ** ** *********, there *** **** *** ** *** ******** **** ******** **** the **** ********** **** ** (**** * ******** ***********). * only ***** * ***** ******* ** ** ********** **** *********** edge *******. **** ***** ***** *** ** **** ******* ** passwords *** ******** ********** **** ******* *********, ********** *** ********* of ******. **'* *** ** *********** ** ***** ****** ***** as *** ***** *****.

** *******, * ******* ******** ********** ***** ******** ** **, the ******** ********, ****** ** ** *** ********* ** **** process *** ****** ** ****** ** *********** ********. ***** **, in *** *******, **** ******* *********** ** *** ******* *****. We *** **** ** ***** (**) ************** *** **** ** be **** ******** ** **** **************.

***** *** *** **** ******** -

**

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Robot Vandalism on Dec 11, 2017
Vandalism of security systems is a common concern. It is so common that camera vandalism statistics show that designers routinely sacrifice camera...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
ASIS Dumps 'ASIS' For Show on Dec 06, 2017
After 60+ years, ASIS is dumping its eponymous show name and replacing it with 'GSX'. This is a classic marketing mistake. For a show struggling...
Hikvision UPnP Hacking Risk on Dec 04, 2017
Hikvision IP cameras are being hacked even for end users who had not set up port forwarding and believed their cameras were 'safe' behind...
Dahua Forbes 'Next Web Crisis' Vulnerability Dispute on Nov 16, 2017
The buffer overflow vulnerability in Dahua products is not in dispute, in fact we covered it when it was first published. What is in dispute is...
Hikvision China Criticizes The WSJ on Nov 15, 2017
Hikvision, through the Chinese government's authoritative news service, has criticized the WSJ investigation into Hikvision. In this...
Vivotek Remote Stack Overflow Vulnerability on Nov 14, 2017
A stack overflow vulnerability in Vivotek cameras has been discovered by bashis, the security researcher who has also found vulnerabilities in...
WSJ Investigates Hikvision on Nov 13, 2017
The Wall Street Journal (WSJ) has released a detailed investigation into Hikvision's government ownership and cybersecurity problems, hitting the...
Ingram Micro: The Blind Lead The Blind on Nov 02, 2017
Ingram Micro, as a huge as they are overall, with $40+ billion in annual sales, has never been a force in physical security, despite, or perhaps...
Hikvision Admits Backdoor 'PR Issue' on Oct 24, 2017
Hikvision is admitting a problem. The backdoor itself is evidently not the problem for them. The problem, according to Hikvision, is a public...

Most Recent Industry Reports

Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
Hiring Camera Calculator Product Manager on Dec 12, 2017
We are working on making the Camera Calculator even better and hoping you can help us find the right person to join our team. IPVM is hiring a...
Testing $20 WyzeCam, The Money Losing Amazon Vet Startup on Dec 12, 2017
This startup is perfecting the old adage: We lose money on every sale, but make it up on volume But it is no joke. The company, Wyze Labs, is...
Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks on Dec 12, 2017
The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by...
Robot Vandalism on Dec 11, 2017
Vandalism of security systems is a common concern. It is so common that camera vandalism statistics show that designers routinely sacrifice camera...
Access Controller Software Guide on Dec 11, 2017
Properly configuring access controllers software is key to a professional access system. These devices have fundamental settings that must be...
2018 Video Surveillance Cameras Overview on Dec 11, 2017
This report concisely explains the developments for surveillance cameras offered in 2017 and the state of offerings going into 2018, including...
Imperial Capital Security Investor Conference Review on Dec 08, 2017
Investment bank Imperial Capital holds an annual Security Investor Conference where 60+ companies present, including this year: IPVM bought a...
Integrator GPS Vehicle Tracking Statistics and Success Examined on Dec 08, 2017
GPS vehicle tracking is a growing but somewhat controversial topic. On the plus side, tracking may increases productivity by providing greater...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact