Dahua Broken Access Control Vulnerability

Published Jan 25, 2022 15:53 PM

Just 4 months after Dahua admitted 2 critical vulnerabilities, Dahua is quietly admitting a new high (8.1) vulnerability. The researchers found ~277,000 of these vulnerable devices online.

IPVM Image

In this report, IPVM examines the vulnerability, first documented by Romain Koszyk of the French cybersecurity and privacy company Digitemis, including:

  • How the vulnerability works
  • Models Impacted
  • Dahua Cybersecurity History
  • Dahua USA No Disclosure
  • Dahua Cybersecurity Guidance
  • Feedback from Dahua
  • How to resolve this

How ** *****

***** ******* *** ******* ***** ******* for *** ****** ** ** *******, without **************, ***** **** ****** ** attacker ** ***** *** ***** ******** using *****'* ******** ************ ***** ******** process.

*********, *** ****** ************* ******* **** documented *** *************, *** ********** **-**** ******** ******** *********** *** vulnerability.

** ******* ****, *** ******** ****** sets * *** ***** ******* (**********.**********):

IPVM Image

**** *** ********'* ***** *** ** the ******'* ******* *****, *** ******** may ******** *** ****** ***** ** code ***/** *** **** ** ******** and **** ** ** ***** ** be ***** (************* ********* ** ****** ~5 *******, ********* ** *** **********).

******** ***** *********:

IPVM Image

******** ***** ******** **** ********:

IPVM Image

Most ****** ********

** ******** **** **** ************* ****** the ******** ** *****'* ********, ********* most *****, ***, *** ******* ****** models, *********, *** ****, ***** ** the **** ********** ****** ***** ******** ** *** security ******. ***** ** ** **** ** North ******** **** ******* *********, **** Dahua's **** **** ******* (*.*. ***-*****). There ** *** * *****-********* *********, and ***** ******** ***** ****** ****** their ****** *** ********.

IPVM Image

********* **** "**** **** ******* **** than *** *** ******* ******* ** the ********." ** ********, ****** ********* lists * ***** ** ***,***+ ***** devices ** *** ********.

Dahua *** ******

**** *** * ***-******* ******** ****** in *** *** ***** *** ********** firmware, *** *****'* **********:

IPVM Image

*** **** ******** * ** **** reset ******, ***** *****:

IPVM Image

** *** *** ********* *** ******* and ***** ***** *** ******* ***** it ********* *** *******.

Port ********** ***********

*****'* ************* **** ********* **** *** a ******* *** ************* *** *********** which ***** ********** ** **** ******* NVRs.

IPVM Image

**** ********** ******* *** **** **** this ************* *** ** *********.

Dahua: **** ************* ******

***** *************** *******:

**** ************* ** **** *** **** recent ******* ** * **** **** of ******** *************** **** ***** ********* which *** *** ** *** *** China **** ***** ***** ** ****-****** manufacturer *** ****** ****** ** *** *** **************.

Feedback **** *****

*****'* ******** ** **** ** *****:

*** ******** *** ********* ** *** customers’ ******* *** ******* *** *** highest ******** *** *****. *** ************* that **** ** ********* ** ** this **** *** ****** *** ** a ******** ***** **** ** ******** in *********, *** ******** ******* ******* are *** ** ****.

**** ***** ** ****** *** ********* we *****:

  • ** ***** ***** ** ******* * notice ** *** ** ****?***** *** *** ******* ** *** cybersecurity ****** **** *** ****.
  • **** ***** ** * ***** ****** announcement ** **** *********? *.*. ***** release ** ****** ***** *****. ** yes, ****** ******* ***** *** ** will ******* **** ** *** ********.
  • **** ********* *****'* ******* ***************, ********* two ******** *************** **** ****, ***** vulnerabilities ** ****, * ** ****, the ******** ** ****, ***. ** years **** ***** **** **** ***** was *********. **** ***** **** *** comment ** *** ***** ***** *************** continue *********?

Patched ******** *********

***** *** ******** ******* ******** *** devices ******** ** **** *************. *** affected *** ************* ******* ******** *** listed****, ** *****'* ******** ********. ******* ******** ** ******* **** vulnerability *** ** ***** *******'* ************ ***** **** ** *** **.

Comments (24)
UM
Undisclosed Manufacturer #1
Jan 25, 2022

***. ***** **** *** ******** ***** mechanisms. *** ** **** ****** ** using ***-**** *********? ** ****** **** there ** * ******** ** *** system. ** **** *** **** ** these.

*** ** ***** * ************'* *** easier **** ** ***** ** ****** the ******** *** *** *****'* **** the ********, *** **** ** ********* a ******** **** *** ******.

(2)
(1)
JH
John Honovich
Jan 25, 2022
IPVM

*** ** **** ****** ** ***** one-time *********? ** ****** **** ***** is * ******** ** *** ******

*** ******* * ** ************ ******* about ** *** ***** ***** **** the ******* ***** ******* ** *** device **. **** ******* **** **** of ************* ******* **** ****** *** Dahua ** / ***** ** **** how ***** ***** ** **** ** verify **** *** ******* ***** ******* is. ****** **** ******** ** *********** on ****?

(2)
(2)
UM
Undisclosed Manufacturer #1
Jan 25, 2022

***** *** **** ****** ******* * "product **********" ****** **** *** **** to ** ******* ****** *** *** use *** ******. **** ** **** I ******* ** ********* **** ***** address *** ********* ******** ***** ******** questions. ** **** *** **** **** password, *** ***** * **** *** it ****** *** * ***** ****. If *** ***'* **** ****** ** the *****, **** *** *** ***** management ******** ** *** ******* ** generate * ******* *** ***** ** from *****, ** **** *** ** code.

**** **** ** *** ** **** data ***** *** (*** ********) ** possible, ** *** ********** ****** ****** them ** ******* ****, *******, *****, phone, ***....

(1)
JH
John Honovich
Jan 25, 2022
IPVM

*** **** ************* **** *** ****** on *** ****** ******* ***********, ** the ********** ***** **** ** *** change *** ******* ***** **** ** already ****** ****** *** **** **** show ******** ***** ********* *** ********. This ******** ******* ***** ** ******** updating *** ***** / ******* *** time *** ******* ***** ******* ** changed, ***/**?

(1)
(1)
UM
Undisclosed Manufacturer #1
Jan 25, 2022

** *** ******** ** ** ******* never ********* **, ***** *** **** still ****? ** ** ******* ********* it *** **** ** *** ************ from *** ******** ** * **********, could **** ***** *** * ****?

*** ****, ** ****** **** **** have ************** **** *** *** *** a ***** **** ******. ***** * good ****.

(1)
(1)
UE
Undisclosed End User #2
Jan 25, 2022

*** *** *** ********* ******** ***** upon **********, *** * ***** ******* of ***** ******* *********** ***-** * password ***** ****** **** ******** ********* (which *** *********) *** ** ***** address( **** ** *** *********) *****. We've ********* ******** ******* ***** ** input * ***** ****** *** *** security ********* ***** ***** ** ****** info *** ** *** ******* ** the ******** ********* **********, *** **** just ***** *** ***** ******* *****, and **** *** ** ********. ** haven't *** ** *** *** ******** reset, ******* ** ******** *******, ** just ******* ******* *** **-** *** set-up.

(1)
Avatar
Ethan Ace
Jan 25, 2022

* *** ** **** ** ****** off *** *** ** ** ****, but * ***** ** ** ********.

*** ** **** ******** ** ********* string **** ******** *** ********** ***** address, ****** ******, *** ***. *** that *********** ** **** ** ***** when *** **** *** ** **** using *** ****** *** ** **** you ***** *** ****** ** **** (as *** *********** *** ** **** exploit). ** ******'* **** ** **** the ****** ***** **** *** ******** any ** **** ** *******.

**** *** ******** ** ******* ** click ***** ******** *** *** **** message ********** **** ****'** ********** **:

IPVM Image

****, *** ***** ******** ** **** sent ** *** ********** *******, *** the ******** ******. ** ** * send ***** **** ****** *** **** NVR, *** **** ***** ******* ** registered, ** **** **** *** ***** code ** ***, *** **. ** Digitemis' ********, *** ****** *** *** reset ***** *** *** ****, ** this ***'* *****.

*** ***** ****** **** ** *****'* phone **** ** ******** ** ******* resetting * ****** ******* ** ********* to *** ********, *********** ** *******, then ********* *** ******** *** *****.

(1)
(1)
UI
Undisclosed Integrator #3
Jan 25, 2022

*** ** **** ******** ** ********* string **** ******** *** ********** ***** address, ****** ******, *** ***. *** that *********** ** **** ** ***** when *** **** *** ** **** using *** ****** *** ** **** you ***** *** ****** ** **** (as *** *********** *** ** **** exploit). ** ******'* **** ** **** the ****** ***** **** *** ******** any ** **** ** *******.

**** ******... ****** ***. ** **** really *** ** *****?

***** **** *** ********** *** **** from? ** ** ** *** ********? Is ** *** **** ** *** devices? ** *** **** *** ********** key **** *** ******, *** *** effectively **** ****** ***** ******** *** any ****** **** *** **** *** MAC ******* *** ****** ****** **?

Avatar
Ethan Ace
Jan 25, 2022

***** **** *** ********** *** **** from? ** ** ** *** ********? Is ** *** **** ** *** devices? ** *** **** *** ********** key **** *** ******, *** *** effectively **** ****** ***** ******** *** any ****** **** *** **** *** MAC ******* *** ****** ****** **?

* ***'* **** ***** ******* ** these ********* **** ***% *********, *** I ***** ***** * ***** **** if ******* *** ******* *****'* ******** reset ********* ** ***** ** *** over *** ******** ** ***.

*** *********** ******** ** ** * minimum, *** ********** ***** ***** *******, the ***, *** *** ****** ******, but ***** ***** ** ***** *********** encoded *****, ****. **** ***** ******** resets **** ** *** **** *** date ** ****** *** ********** ***, also.

(1)
bm
bashis mcw
Jan 25, 2022

***** **** *** ********** *** **** from?

*** ****** ***

** ** ** *** ********?

***

** ** *** **** ** *** devices?

**

****: *** *** **

*** *** ******* *** ***** **** Firmware, *** ** ******* *** ********* devices.

* ***** ***** ** * ****** for *** *** ********* ****** ****** with "**************", ***** **** ** **** points ** *** ******* ***.

(4)
UI
Undisclosed Integrator #3
Jan 25, 2022

** ** *** ****** *** (******** to *** ******* ******) ******** * message ** *** ****** *** ****'* what's **** ** *****? *** ** earth **** **** ********* ************? *'* still *** ******* **. ** *** serial ****** ******? ** *** ****** key ** ** *** ********, ****'* not ****** (****** *** ***'* ******** to ********* ****** ********, ******). ***** if *'* ****** **** *********.

bm
bashis mcw
Jan 25, 2022

******** ********* **** ****** *** *** only ** ********* **** ******* ***. Private *** *** *** ** *** FW, **** *** **** *****.

*** *** ************, */* ***** **** specific *******, **'* **** **** ***** wrote *****.

IPVM Image

*******, *** ***** **** *** *** back **** *** ****** ****** ** used ** ******* ******, ** *** details *** **** ******** *** **** device ****. **** *** *******, */*.

(1)
UI
Undisclosed Integrator #3
Jan 25, 2022

** ** ******** ** ********* *** RSA *** **** **** ***, ** you *** ******* *** *******?

(1)
bm
bashis mcw
Jan 25, 2022

**, **'* */* **********. ***, ** you ***** **** *** **********/********** ** FW *** ******* ******* *** **** flash **** ****** ** ** *** device.

*******, * ****** ***'* *** **** point ****, *** **** **** ** see **** ****** *** *** ********* content ** ****?

UI
Undisclosed Integrator #3
Jan 26, 2022

****, *'* ******* **** **** ***** is *********.

*** ******** ** ** ******** ******* has ******* ******. *** ******** **, can *** ******** ***** ** ****** to *** **** *** ****** ******?

*** **** ********* **** ** * shared ****** ******* *** ****** *** Dahua. * **** **** ** *** broader ******* - ********* **** ***** and *** ****** **** **** *** attacker **** ***. ** ***** ** no ******, **'* **** * ****** of ********* *** ***** ******* *** the ******** **** (** ** *****, I ***'* **** ****** *******). **** create * ***** ******* **** * burner ***** *******, ******* ** **** the ****** ***, **** ** ** Dahua *** ****'** *** *** **.

******* ** *** ******** *** ** part ** *** ******. ****** *** cryptography *****'* **** **** - *** that ***** ** ****** **** *** read *** *******. ******* ************ ***** is ***** - *** **** *** device ** *** ******.

* *** *** *** *** ******* if *'* ** *** *******. **** can't ** *** ******.

****** ************* ******. * ***'* **** **** information *** ******* ******, *** * lot ** ******* **** **** ******. In ** *******, ****** ****** ** more ** ********* ** ********, *** proof. **** *** ********, *** *** the ********.

*** **** *** * *** ***** of *** ***** ** ** **** is ** **** * ********* **** in *** ******. **** **** ********** *** **** ******** *****. *** code ** *** ** *** ****** in *** ******* *** ****** ***** with *** ****** ****** ** * giant ******** *********.

****** *****'* * **** ** ***** authenticity ** *** ****** ****** ** used (*** **** *** **** **** unauthenticated ***), **** ** ****** ***** like *****'* * *** *** ** attacker ** *** **.

(1)
bm
bashis mcw
Jan 26, 2022

*** **** *** * *** ***** of *** ***** ** ** **** is ** **** * ********* **** in *** ******.

**'* **** ******* **** *** *****, the *** *** */* *** **** one ***** ***** ** *** ****, there ** **** ***** ****** ****'* more ******* ** **** ******* **** cannot ** ***** ******* ** *** device ******. ** **** *** **** have * ********* ** *** (** something) *** *** ******** ** *** code.

* ***** *** *** *** *** "Cybersecurity ********" **** * *** ** another ****** **** ** ****, *** is *** ****** ** **** ** reveal ********** ******** ******* **** * know ** **** *******.

(2)
UI
Undisclosed Integrator #3
Jan 26, 2022

**, **, *'* *** **** ***. I'm *** ***** ***. **** * sysadmin *** * ***** **********. * don't **** ****** ** * ***** device, ********* * ***** **** **** trying ** ****** ***** ********* ******. The ******** ***** ******* ******* ****** sketchy ** **, *** * ***** it's **** ****. ** ******** ******* was ***** **** ******* * ******* I ***** ** ** ** *********, but **** ***** ***** ** ********* I ****'* ****** (***** *** ******* out). ****** *** ****** *** **** to *******.

(1)
(1)
JH
John Honovich
Jan 26, 2022
IPVM

* ***'* **** ****** ** * Dahua ******

*** *** ** ****** **** ******** / ********* ** *************, ** *** facilitate ****** ** * **** ****** of ******* **** ******* *************. **** email ** - ****@****.***

(1)
bm
bashis mcw
Jan 28, 2022

** *****, ** ******** ** ***** (and ***** *** ****** *** **** another **** ******)

**** * **** ***.

Avatar
John Scanlan
Jan 25, 2022
IPVM • IPVMU Certified

*** ******** ***** ********* ***** *******.

* *** ** ** ******* **** only *** *** *** * ****** connected ** * ****** ******* ** uplink ** ***** *****:

IPVM Image

* ******* ********* *** ***, ********** the **, *** ******* * ********. I ******* ** ***** ** *** contact *** *** ******, ***** **** a ********* ***** ****** * ***** it. * ********* *** ****** ******** procedure **** ******* *** ** **** and **** *** ******** ****** ** Dahua *** *****. * ******** ** email **** * **** **** ** about * ****** *** *** **** to *** * *** ******** *** then *** **.

(2)
(2)
JH
John Honovich
Jan 25, 2022
IPVM

**** ****! **** ** **** *** QR ****, ** ** **** ********* what *** ******* ******* ***** ** and **** ** ********* ** **** is **** **** ** *****?

bm
bashis mcw
Jan 25, 2022

*******, *** ***** ** **** ** the *** ********* *******.

****** ****** ******** ***** ***, **** issue **** **** **** *** ** that ** **/*** ******** ** ****** the ***** ******* */* **************.

* *** ******* *** *************, *** some ***** ********* *** ** ****** w/o *** ******** ** ***** **, have *** ***** ******* */ *** FW *** *** ******* *******.

**** **** ******* ** *** **********.

(1)
(1)
JH
John Honovich
Jan 25, 2022
IPVM

**** **** ******* ** *** **********.

***, ** **** ****,**** ********* ******** **** ******* ********** **** ***** it *** **** *** ******* *** timing ** ***** *******:

***** ********** **** *** ***** ***** team, ** ****** *** **** ******************** **** **** ********** **** *************.

(2)
bm
bashis mcw
Jan 25, 2022

***********, ****** ** **** ****** ** keep ** "** **" ** ****** didn't ****/********.