Bashis Joins IPVM To Lead Cybersecurity Research

Published Sep 20, 2022 14:55 PM
PUBLIC - This article does not require an IPVM subscription. Feel free to share.

Bashis has joined IPVM to lead our cybersecurity research, expanding the depth and breadth of IPVM's reporting.

IPVM Image

His discoveries include 13 that have been assigned Common Vulnerabilities and Exposures (CVE) IDs (5 Critical, 2 High, 4 Medium, 2 Low) plus a dozen more vulnerabilities, affecting companies including Axis, Cisco, Dahua, Geovision, TVT, Uniview, Vivotek, and more.

IPVM plans to publish cybersecurity research that helps educate the public on general risks in physical security technology as well as specific risks and vulnerabilities in individual products that are widely used. This will include tutorials and other educational reports, software "teardowns" of individual products, and discovering new vulnerabilities.

For the new vulnerabilities that Bashis and IPVM find, we will follow responsible disclosure, contacting manufacturers 90 days prior to full disclosure of the vulnerability.

IPVM Founder John Honovich stated:

Research is core to what IPVM does and no one has found as many vulnerabilities in physical security as Bashis. We are excited that Bashis has joined IPVM and are focused on improving this industry's cybersecurity, educating professionals and exposing risks that endanger the security of the public.

With more than 20 years of experience, Bashis' work has exposed prominent cybersecurity vulnerabilities, with notable discoveries including Axis Communications Remote Format String in 2016, and the Dahua Technology Backdoor in 2017.

See Bashis' CVE assignments: 5 Critical, 2 High, 4 Medium and 2 Low Severity.

Vulnerabilities Discovered Without CVEs Assigned

Additionally, Bashis has discovered the following vulnerabilities that were not assigned CVEs:

== 2019 ==

== 2018 ==

== 2017 ==

Feedback / Questions

Feedback or questions may be left in the comments, or one can email mcw at ipvm dot com or info at ipvm dot com.

Comments are shown for subscribers only. Login or Join