Axis Camera Vulnerabilities From Google Researcher Analyzed

By Brian Karas, Published on Mar 23, 2017

A Google security researcher has reported 6 vulnerabilities for Axis cameras, affecting multiple models and firmware versions.

In this report, we examine these vulnerabilities, potential for exploit, and the practical risk of them.

Vulnerabilities ********

* **** ** *** Full ********** ******* ***** the ********* * ***************:

******: ** *****-**** ******* forgery ***********

******: ****** ****** ****** for *** 

******: *** ******** *** as **** 

******: ****** ****** ******** allows *** ********* ***** as **** ** ********** CSRF ****** 

******: **** ****** .*** scripts *** ******** ******* 

******: ********* ** ******* the **** *********

**** *** **** ****** their ********** ** ***** ***************** ************ ************.

Key ******** / *******

*** **** ** ** attacker ************ ***** ***** vulnerabilities ** ********* ***.

** ****** ***** ******* all **** ** *** ********* criteria ** ** ***:

  • ******** ** **** ** trick * **** **** clicking * ********* **** in ** ***** ** on * *******, ***** calls * ****** ** the ******
  • ******** ***** *** ******** IP ******* ** ******** of * ********** ******* to ******* ** ***** or *******
  • *** **** ****** ** that **** ***** ****** into ***** ******* ******** ** the **** *** ******* the **** ** ******* on
  • *** ******* *** ** firmware ***** ** *.*.* that ***** ******* ******** 3 ***** ***, ** March ****

********* *** **** ** *** above is **** *** ****** researcher ********* ** *** ability ** '********' *** device. *******, **** ** vastly **** *********** *** difficult ** ******* **** the ***** ********, ***** ****** *** can ******** ******* ** a ********** ****** *** backdoor **. 

************, *** ************ ******** would ********* ***** ** attacker ** ******* ****** to a **** ******* ****** of *******, ** ***, reducing *** ******* ** this ***** **** *** broad attacks.

*** ******* ** ******* are *** ********** ** this *******, ** ***** is ** **** ** clicking * ********* **** while ****** **** * VMS **** *** ***** access ** * ******. 

Affects ******** ***** ** *.**

**** **** ******** ******** prior ** *.** *** a ********* *** ************* that ***** **** **********. Users ******* ***** ******** should******** ******* ******** **** Axis' ******* ******* *** *** of **** *******. ***** many ****** **** ***** firmware *********, ***** *** still * **** ***** of ******* *** ***** updated ******** ** *** available. 

** ** ******** ****** is *********, ***** ***** be ******* ** ******** the *** ** ******** to ****** *** ******, use * ******* ***** than *** ******* ******* when ***** **, *** avoid ******* ****** ** clicking ***** ** *******/********* sites **** ****** **** any *******.

CSRF ******* - *** ** *************

***** *************** ******* ****** a**** ***************. ** *****, **** attacks **** ** * user ***** ****** **** a ******'* *** ********* *** then ******* *** **** to ***** * **** that ********** ** * specific ******* ** *** device. *** **** ** often ********* ** ********* else, **** ** * link ** ** ***** where *** **** **** "Click **** ** ***** your *******", *** *** URL *********** ** * command ** *** ****** (ex: ****://***.***.*.**/***-***/******.***).

*** ***** ***** ******** a **** **** ***** overview ** ****:

******* *** **** ******* has ****** ** *** device, *** ***** *******, VPN, ** **** ***** means, *** ******** **** not **** ******** ****** access ** *** ******, they **** **** ** trick *** **** **** clicking * **** **** a ********* ******* ***.

CSRF **********

**** ******* *** ********* ** requiring * ******* ***** as **** ** *** request. *** ***** ** a **** ****** ********* by *** ******, *** sent ** *** ****** to ******* **** *** request, ***** ***** **** the "****://***.***.*.**/***-***/******.***" ******* **** **** "****://***.***.*.**/***-***/******.***?*****=***********". ** * **** application, *** ***** ** much ******, ****** ** effectively ********** *** ** attacker ** ***** *** include **** ***** ********* link.

VAPIX ******** **** ***** ***

********* ** ****, ***** ***** API ** *** ********** with **** ******, ***** prevents **** **** ***** this ********* ** ******* CSRF *******.

Axis **** ****** - ********* ***

**** ******** * *****-** file ****** ** ***** cameras, ** **** ** easier *** ***** ** edit ****** ***** ** other **** ***** ** the ******. **** **** editor ** ****** ** the *********, ***** **** as **** ** ******** cameras, ****** ** *** potential ** ******** ** overwrite *** **** ** the ******.

**** **** **** ****** will ** ******* ** a ****** ******* ** further ****** ******* *********.

 

Comments (19)

Interesting.  Does Google do these tests randomly or is this a researcher doing this as a side project?  Is this possibly related to the Arecont to Axis switch from last year?

I believe the research is done under the "Project Zero" program.

Excellent information and article, thanks. So if I'm reading this correctly, is it safe to assume this type of exploit is rendered even more unlikely when the camera network is logically segregated from the internet/internet connected devices?

is it safe to assume this type of exploit is rendered even more unlikely when the camera network is logically segregated from the internet/internet connected devices?

Not really. If an operator can access the cameras via a browser, it would not matter if they are local, remote, segregated or not.

Part of what makes this kind of attack different is that the operator, who is in this case presumably able to access the internet or receive email AND access the camera network becomes a kind of "proxy" for the attacker. The attacker can not access the cameras directly, but they send a malicious to the operator who CAN access the cameras, and when that link is clicked, the cameras are compromised.

Again, it is worth mentioning this still requires the attacker to know the IP address of a vulnerable camera, and get the operator to click a malicious disguised link that goes to that camera, while the operator is already logged into its web interface.

Can't believe people still sell these vulnerable devices.

Can't believe people still sell these vulnerable devices.

Jon, rather than a sarcastic comment, can you offer something of analytic substance to the discussion?

I was just making a comment similar to what I see every time there is a Hik/Dahua vulnerability announced. Yes, it was sarcasm and wasn't helpful, unless pointing out the absurdity of the typical stance. 

No brand is 100% safe. Not Axis. Not Sony. Not Hikvision. For sure not Dahua. Some are far better than others. Some have larger targets due to the popularity of their products and the vast amount of deployed products. 

This just goes back to my stance that you can't trust ANY IoT device entirely and they MUST be segregated to the furthest extent possible. 

Anyone who relies on their particular brand to ensure absolutely zero vulnerabilities is foolish to do so. Every single integrator and end user must take preventative measures to ensure these vulnerabilities are mitigated as much as possible. 

Jon -

You do recognize that there is a large degree of difference between this vulnerability in the Axis cameras, and the recent Dahua and Hikvision vulnerabilities, right?

 

That may be your perspective, but to me a vulnerability is a vulnerability to a great extent. Sure, some only allow you to view an unauthorized feed or something much less nefarious than root access to the OS. But to be completely frank, these devices shouldn't ever see daylight IMO. Even if you can assure me they are safe today, you can't assure the same tomorrow. 

but to me a vulnerability is a vulnerability to a great extent.

But vulnerabilities, like 'accidents' and 'crimes' can vary greatly in their significance. 

On a scale of 1 - 10, please rank the above Axis vulnerability to the Dahua vulnerability from this month.

I'll go first: Dahua is a 10 since it's so easy to do. Axis is a 1 since it requires a combination of nearly impossible steps to work.

Your turn, Jon. Please rate them on a scale of 1 to 10.

A vulnerability is a vulnerability?  That's just silly.  If you actually believe this, then it would make life impossible.  We survive by taking calculated risks.

 

I assume that you will use some form of motor-powered transportation today.  You must have a death wish!  Haven't you seen the terrible accidents at the Isle of Man TT? 

You'd be much safer to walk everywhere.  But wait!

Forget it, just stay home!

A vulnerability is a vulnerability.  Any and all devices on the network whether that network is "isolated" or not, can become a source of a network attack. 

We as the "good guys" must protect our network from any and all possible intrusions.  For the "bad guys"  they only need to find one weakness to exploit, so the advantage will always be with the bad guys.

Your presumption that certain vulnerabilities are worse than others (a scale of 1 to 10) presumes that all exploitable vulnerabilities will result in the same impact to the system.  A vulnerability of "1" (your scale not mine) can be severe if it is on a mission critical system where more aggressive attacks from more determined hackers are being launched and the success of the attack will have a severe and significant impact on the system or operations of an organization which may reach beyond just the camera system.

We as an industry need to take information security more seriously.  There are some manufacturers who are knowingly allowing common vulnerabilities and exposures either because they don't want to invest the money in properly hardening their devices or they are responding to customer requests to exchange convenience for security.  I have unfortunately encountered integrators and end users who complain about the challenges of implementing very robust IT security in their network.  In addition, a highly secure network requires constant maintenance and upkeep as new CVE's are discovered not only with the devices but with the computing and network systems that they are attached to.

We have not heard the last of these vulnerabilities and they will continue to plague our industry.  The real questions for those who appreciate and desire strong IT security are, is how pro-active your vendor is being with their information security and how quickly do they react when a vulnerability is discovered?

Keep up the good work in reporting this information as awareness is the first step to providing a more secure system, but unfortunately, the bad guys are always looking for ways in and sooner or later they will probably find one. 

Your presumption that certain vulnerabilities are worse than others (a scale of 1 to 10) presumes that all exploitable vulnerabilities will result in the same impact to the system.

No, my point is that some vulnerabilities are much easier to exploit than others. The Dahua vulnerability will result in large scale exploits, guaranteed. This Axis one, if it even results in 1 exploit, would be amazing given how hard it is to use.

My point is that neither would matter if they were properly quarantined in a segregated network. 

Jon -

Do your customers ask for remote access to their systems? If so, what is your method for keeping everything quarantined and segregated, and also allowing customer access? 

Dual NICs in the VMS server  with a single port forward for the VMS only. We usually have remote access to the server via Splashtop Streamer using two factor authentication. The second NIC and the cameras are on a non-Internet facing network. Soon, we won't need the port forward for remote viewing. 

My point is that both matter if they are exploited.  I guess my concern is the attitude that "well it is hard for someone to exploit so it is no big deal."  Perhaps I am reading something into this that wasn't meant.  As an IT security professional, the risk of a CVE isn't judged based on "how hard" it is to exploit it is judged on what damage can be done by exploiting it.   My concern is the disconnect between our industry and network security professionals.  I guess I am objecting to the premise of the question.  if we want to rate a vulnerability we need to do so based on what damage can be done.  For example, if a vulnerability allows someone with special expertise to change the date/time of a camera, that might be considered a low risk.  if the vulnerability can be used to launch a more serious attack on the network, delete data or launch a DoS attack for example,  that is a more serious exposure regardless of how hard it is for someone to do. 

 

regardless of how hard it is for someone to do.

How hard something is certainly impacts proper security planning. If two things have the same potential impact, but one takes a miracle to do and the other a child can do, the later one is much more of a risk. Agree/disagree?

Agree!

John, you are correct to focus on  the vulnerabilities of hardware. Any responsible End-User will base their overall cyber-security programs on a Risk Management approach.  It is the only practical  way to administrate security.  

Risk is a factor of the Threat (who is attacking), the Vulnerabilities in the system and the Consequence of an attack.  While a bit simplified, this is the general equation. Some Risk methodologies are volumes long and mathematically complex processes.  

Customers rarely provide enough details on Consequences to their business or the Threats they need, or are willing to, protect against. Add to this equation, that most integrators don't possess the qualified consultative assets to conduct a comprehensive Risk Management Study  

So in the end, your premise is correct.  Lowering the vulnerability in hardware may be the only practical step an integrator can unilaterally deliver to a customer. 

Read this IPVM report for free.

This article is part of IPVM's 6,596 reports, 889 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Ubiquiti Access Control Tested on Oct 21, 2020
Ubiquiti has become one of the most widely used wireless and switch providers...
Axis Exports To China Police Criticized By Amnesty International on Sep 21, 2020
Axis Communications and other EU surveillance providers are under fire from...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
Axis Compares Fever Camera Sellers to 9/11 on Sep 18, 2020
Axis Communications, the West's largest surveillance camera manufacturer, has...
ISC News Fakes Fever Screening, Falsely Quotes FDA on Jun 18, 2020
ISC News, the Reed publication behind the ISC East and West trade shows, has...
US GSA Explains NDAA 889 Part B Blacklisting on Jul 31, 2020
With the 'Blacklist Clause' going into effect August 13 that bans the US...
The Insecure Verkada Access Control System on Jun 25, 2020
While Verkada touts the security of its system and that how their new door...
Dangerous Hikvision Fever Screening Marketing In Africa on Sep 15, 2020
A multi-national African Hikvision distributor is marketing dangerously...
Exit Devices For Access Control Tutorial on Aug 25, 2020
Exit Devices, also called 'Panic Bars' or 'Crash Bars' are required by safety...
JCI Sues Genetec For Patent Infringement on Jul 13, 2020
Surprisingly, security giant JCI has sued their partner, security software...
Vape Detection Legal Battle: Soter Sues IPVideo Corp on Jul 22, 2020
The crosstown vape detection rivals are now in a legal battle. While IPVideo...
Panasonic i-PRO Hid Huawei, Does Damage Control on Aug 21, 2020
Panasonic i-PRO hid their usage of Huawei from the public, continues to...
Risks Of Managing End User Passwords (Statistics) 2020 on Sep 11, 2020
Alarmingly, most integrators used spreadsheets to manage passwords, IPVM...
Integrator Acquisitions 'A Good Market' During COVID-19, Says Greybeards on Jul 28, 2020
Industry broker Ron Davis of the "Greybeards" says that the integrator and...

Recent Reports

Consultants Online Show LIVE Today! on Oct 27, 2020
IPVM's 7th online show will feature 20+ consultants and recruiters presenting...
Eagle Eye Networks Raises $40 Million on Oct 27, 2020
Eagle Eye has raised $40 million aiming to "reinvent video...
Hikvision Q3 2020 Global Revenue Rises, US Revenue Falls on Oct 27, 2020
While Hikvision's global revenue rises driven by domestic recovery, its US...
VICE Investigates Verkada's Harassing "RawVerkadawgz" on Oct 26, 2020
This month, IPVM investigated Verkada's sexism, discrimination, and cultural...
Six Flags' FDA Violating Outdoor Dahua Fever Cameras on Oct 26, 2020
As Six Flags scrambled to reopen parks amid plummeting revenues caused by the...
ISC Brasil Digital Experience 2020 Report on Oct 23, 2020
ISC Brasil 2020 rebranded itself to ISC Digital Experience and, like its...
Top Video Surveillance Service Call Problems 2020 on Oct 23, 2020
3 primary and 4 secondary issues stood out as causing the most problems when...
GDPR Impact On Temperature / Fever Screening Explained on Oct 22, 2020
What impact does GDPR have on temperature screening? Do you risk a GDPR fine...
Security And Safety Things (S&ST) Tested on Oct 22, 2020
S&ST, a Bosch spinout, is spending tens of millions of dollars aiming to...
Nokia Fever Screening Claims To "Advance Fight Against COVID-19" on Oct 22, 2020
First IBM, then briefly Clorox, and now Nokia becomes the latest Fortune 500...
Deceptive Meridian Temperature Tablets Endanger Public Safety on Oct 21, 2020
IPVM's testing of and investigation into Meridian Kiosk's temperature...
Honeywell 30 Series and Vivotek NVRs Tested on Oct 21, 2020
The NDAA ban has driven many users to look for low-cost NVRs not made by...
Ubiquiti Access Control Tested on Oct 21, 2020
Ubiquiti has become one of the most widely used wireless and switch providers...
Avigilon Aggressive Trade-In Program Takes Aim At Competitors on Oct 20, 2020
Avigilon has launched one of the most aggressive trade-in programs the video...
Mexico Video Surveillance Market Overview 2020 on Oct 20, 2020
Despite being neighbors, there are key differences between the U.S. and...