Axis Hides Exploit Danger

Author: John Honovich, Published on Aug 09, 2016

Axis is hiding the severity and danger of the 'remote string format' vulnerability.

We ask Axis to fully communicate the risks of the released 'Hack Axis' program to Axis users and urge everyone with Axis devices to upgrade them immediately. 

Exploit Danger

The danger is that a working 'Hack Axis' program was released 3 weeks ago. This programs allows:

  • Root access to Axis devices, without having to know or figure out the password (regardless of how hard the password is).
  • Changing the Axis web password, with a simple additional command, to get full control of video and configuration
  • Turning Axis devices into botnets to attack computers throughout the world.
  • Hijacking Axis devices that continues even after they are upgraded to 'fix' the exploit and even after a factory reset, allowing continued malicious access and control. This was tested with a researcher who did this to an IPVM Axis device, which we verified. 

Axis stresses the main 'limitation' is that one needs network access to the camera, which is true, but undermines that mistakes can occur that allow devices to be remotely accessible and that many contractors, including competitors, often have access to internal systems. And, of course, the tens of thousands of Axis devices made publicly available are extremely at risk.

Axis Communications Failure

Axis has never communicated that a working 'Hack Axis' program has been released and shared across Internet hacking sites. It is now 3 weeks since this was done and Axis has done nothing to communicate that or correct their existing erroneous communications.

(1) The Axis FAQ on this issue declares:

[Update Aug 12th: Axis has edited the FAQ to remove this claim.]

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

But the vulnerability has been disclosed and is widely known and available on many cybersecurity / hacking sites, including the Exploit Database.

(2) The Axis corporate press release states:

 

Unfortunately for Axis users, Axis has not updated that release nor issued any subsequent release making it clear that not only it is disclosed but the working program allowing for exploitation is released.

(3) Axis has a CVE report which at least mentions the appropriate term exploit:

Three weeks after it was disclosed, Axis still has not updated this.

[Update Aug 12th: 24 days after the disclosure Axis has issued a new CVE report where they acknowledge the full exploit and the available Python script.]

In sum, Axis, after initial limited announcement and no communication about a full working program being released, is now completely ignoring the issue. We emailed Axis management multiple times about these concerns in addition to previous posts that raised them, without any action from Axis.

Axis Take Responsibility

Axis, please immediately fix all of your documentation and then issue a new release and email blasts explaining that a working Hack Axis program does exist and is widely available for hackers and your competitors to take advantage.

Exploits happen to everyone. We agree with Axis engineering team that this was a very hard / obscure exploit to find. That it happened should not be a black eye for Axis.

Axis is great at communication... when they want to. But how Axis has (not) communicated this is inappropriate, leaving Axis partners and customers at significant risk. Axis certainly wants to be a leader in cybersecurity. This exploit should not undermine that. But failing to properly inform your users of the full risk absolutely should.

2 reports cite this report:

History of Video Surveillance on Sep 22, 2016
This is a concise history of video surveillance covering the past decade.  The goal is to help professionals newer to the industry understand...
Dahua Distributor Angered "Always Give Good News About Hikvision" on Aug 11, 2016
A Dahua distributor is angry that "IPVM always give good news about HIKvision while destroys Dahua." I can understand the frustration, not of...
Comments (7): PRO Members only. Login. or Join.

Most Recent Industry Reports

Startup Flock Declares Itself "The New Standard For Neighborhood Security" on Dec 15, 2017
Mega startup generator YCombinator has backed a startup targeting neighborhood video surveillance and security. Flock Safety is taking a...
Directory of VSaaS / Cloud Video Surveillance Providers on Dec 15, 2017
This directory provides a list of VSaaS / cloud video surveillance providers to help you see and research what options are available. 2018 State...
Integrator Managing Projects Statistics on Dec 14, 2017
Who actually manages projects for security integrators? Does the average security integrator have dedicated project managers, or are technicians,...
Hikvision NVR Load Testing on Dec 14, 2017
IPVM members recently debated Hikvision NVR's performance under load in Hikvision 30+ Cameras On NVR - Apps And Client Really Slow Down And CPU...
This Manufacturer Shuns IP Cameras on Dec 14, 2017
One manufacturer has chosen a bold strategy in avoiding getting caught up in the race to the bottom: shun IP solutions. We spoke with an executive...
Testing DMP XTLPlus / Virtual Keypad Vs Alarm.com & Honeywell on Dec 13, 2017
DMP has a strong presence in commercial intrusion alarms, but not in residential. However, the company's XTLPLus wireless combo panel and Virtual...
BBC Features Dahua on Dec 13, 2017
Hikvision is not the only mega-Chinese video surveillance manufacturer getting global attention. Last month, the WSJ investigated Hikvision and now...
Hiring Camera Calculator Product Manager on Dec 12, 2017
We are working on making the Camera Calculator even better and hoping you can help us find the right person to join our team. IPVM is hiring a...
Testing $20 WyzeCam, The Money Losing Amazon Vet Startup on Dec 12, 2017
This startup is perfecting the old adage: We lose money on every sale, but make it up on volume But it is no joke. The company, Wyze Labs, is...
Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks on Dec 12, 2017
The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact