Dahua Forbes 'Next Web Crisis' Vulnerability Dispute

Author: Brian Karas, Published on Nov 16, 2017

The buffer overflow vulnerability in Dahua products is not in dispute, in fact we covered it when it was first published.

What is in dispute is how significant the vulnerability is, and the risks posed to users with unpatched devices.

This was recently showcased in a Forbes article, calling it bluntly 'the next web crisis', including a video demonstration of an 'Ocean's Eleven' Dahua hack:

IPVM has researched this, talking with Dahua, Forbes and the cybersecurity research firm who found this vulnerability, finding conflicting claims. Inside this report, we examine the vulnerability, the claims being made by each party and what this means for both Dahua and cyber security reporting.

********* ******** ************* ** ***** ********** *** ** *******, ** **** ********* ** **** ** *** ***** *********.

**** ** ** ******* ** *** *********** *** ************* **, and *** ***** ***** ** ***** **** ********* *******.

**** *** ******** ********* ** * ****** *******, ******* ** bluntly '*** **** *** ******', ********* * ***** ************* ** ** '*****'* ******' ***** hack:

**** *** ********** ****, ******* **** *****, ****** *** *** cybersecurity ******** **** *** ***** **** *************, ******* *********** ******. Inside **** ******, ** ******* *** *************, *** ****** ***** made ** **** ***** *** **** **** ***** *** **** Dahua *** ***** ******** *********.

[***************]

Vulnerability ******

*********** ************ ************, *** ******* **** ********* ******** *** ****** ******** *************, claim ** *** ** **** ** "****** ***" * ***** feed, ******** ********* ** ******* *** **** ****** **** *** camera **** * **** *** ** ***** ********.

**** ** "************" ** *** *****, ****** ** *** **** careful *********, ** ********* *** ***** ** *** ****** ******* of ******* *** *******, *** **** *** ******** ****/******** *** alternate ***** ***** *** ***** *** ***** ****** ***** ***** as ****-***** ******, ** **** *** **** ** ****** ****** running ***** *** ***** **** ****** *** *** ** ******** in * **** ****** *******.

Dahua *******

***** ************* ************' **** **** ** *** *******, ***** ****** **** *** *** *** *** *** ************* named ***** ****** ** **** **** * ****** ** ******* (DoS):

*************, *** ****** ******** ************* *** *** *********** ** ****** code *********. **** ** *** ******* ** *** *********. “…..****** a ******* **** ******* ** *** ********** *** ********* *** gain ********** ****** ********”.

*******, ** *** *** ********** * **** **** ***** ******* this ************* ***********. *** **** ****** ****** ** *** ******* is ***.

Details ********

*********** **** ******** ************ ***** *** ******* ********** ********* ******* beyond **** *** ********* ** *** *****.*****-**** ********, *** ********* *** ******* ** *** ****** ***** ******:

*** ******* **, **** ** **** ***** * *****-**-******* ** an ****** **** ***** ** *********** **** ** * *** system ** ** **-******. *** ** *** *********** ********** **********, we ****** ******** **** ******* ******* ** *** ** *** be ****. ** *** ******* ************* ** ******* **-******* ***************, and **’** **** **** *** ** ****.

**** *****, *** ******** *** ******* ************* *** ********* *** ******* used ** ******** ** *** ****** *****, ******* *** ********* description ** *** *******:

** **** ****** *** **** ***** ***** ******** ******* ** client **** ***** ******. ** ****** *** ***** *************. ** had *** ****** *** *** ** ***** ****** **** **** Linux ******.

******* **** ** ***** ** **** ****** ****/***** ****** ** the ****** ** ****** ******** ********, ***** **** ***** ** expected *** **** ** *******, *** ****** ********* ******* ****** specific *******. ******* ** ****** **** *** ****** ******** ************* (which ****** ** ******* ********* ******* **** **** ********) *** be ********* ** ****/**** ***** ********* ** *** ******, *** then **** *********** ** ** ******** ** * ***** ******.

Forbes ******* ************

***** *** ** ******** *** ********* *********** ** *** *******, the ****** ****** ******** ** ***** ******* *********** ************, ******** the ***********, *** *** *********** ** *** **-**** ********** (***** makes ** ******* ** *** ******* ** ***** ***** *******):

** **** ****, ** ****** ** *** ******* ******** *** watched *** ****** ******* ****, ******* ******** ** *** *********** and *** *********** ******** ** **** *** *** ** **********.

**** ****** ******* *** ************* ** *** ******* ********, ****** responds **** **** ********* ***** *** ** ***** *** ************ of *** ***** ******* ** ****** ********* ******* ** ** how **** ******** *** ******* (*.*., ********* ****** ****, ****** another *********** ******** **** ** ****** ********'* ***** ** *******):

*****, *** *** ******* **** ** ** *********** **** *** on *** *** ***** **** ** ***********? ****'* *********** **********? If *** *** **** ** * ****** *** ********** ********** it, ****** ******** ** ******** ** *** ** *'* *********.

** ********, ** ********* **** ***** **** ** ********** *** exploit ***** ** **** ** "*** ****" ** *** ***** of ******** ****** ** * **** ***** ***** ** ******** could **** ********* ******** *** ******* ******** ** ****. *** exploit *** ******** ***** ******** ** *** ****** ******* ******* as ****, ******* **** *** ******** ****** *** *** ******* would *** ** ****, *** **** *** *** ***** *** full ****-******* ***** ******.

Dahua *** ********

** ***** **** ****, ******** ****************** ***** ********** ********** *** "**** ** ***"*** ****** ******** *************. *******, **** ***** ** ** *** contacted ***** **** ******* ** *** ******* ** **** ****** that ***** *** ******** ***** **** (***** ***** *** *** feel **** ** ******* *** *********), ***** *********:

* ****'* **** **** ***** ***** **. * ***'* ***** they *** ****** *** **, ** **** **** **** ** change... **** ****** ** *** *** *** **** ****** **** another *** :)

More ********* ******* *****

***** ** *** ****** *****, ** ******* ** ***** ** cameras ***** **** *** * ******, * **** **** ****** scenario, ****** **** ***** ***** **** ** **** **** **** triggering * ****** ******** *******, ****** ********* ********** **** ** be ******* ****** **** *** ******. ***** ******** **** ** leveraging ** **** ****** ********** ** *** **** ****** ** a ***** *****.

***** ********* ** *****, *** ************* ******* *** ******* *** merely ***** ** ******* * ******. ***** **** **** ***** is *** ******* **** *** **** ********, ** ***** *** be ********* ** "****** ***' * ***** ****** ** **** cases, ****** ********* *** ****** ******** ***** ********* ** ****** done, *** ******* *** **** ****** ** ******** ** **** video ** *** ***** *** ********.

Cyber ******** ****

** ***** ******** *********, *** *** ***** ***** ** ********** insecure ******* ** ********, *****, ** **** *** ********** ** sensationalize ******** ***** **** ******** ********* *** ******* ***** **** omit ******* **** ********** ***** *** *****. **** *** ***** in ******** ***** ******** ************* ******** (*,*,*) **** ** ** ******** ** *********** *************** ** **** that ****** ********** ********* *****.

Comments (2)

***** **** ** **** **** ****** ***’* ******** ** *** likely ** ** **** ***** * ****** ******** ****, **** a ****** ****** ****** *** ** ***** *** ** ********* in **** ******.

**** **** ** *** **** **** ** * ******* ** verify, ***** ** ******* ** *********.

*** **** *** ******* ** ******* ******** ****** ******

# ***** ** *****: *********** ** **** ******* ***** ***** not ***** ********, ** *** ***** ******'* ** ****** ******* real **** **** *****

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Winter 2019 IP Networking Course on Jan 10, 2019
Today is the last day to register for the Winter 2019 IP Networking course. This is the only networking course designed specifically for video...
Bosch VDOO 2018 Vulnerability on Dec 20, 2018
Security research firm VDOO has discovered a critical vulnerability in Bosch IP cameras. Inside, we cover the available details of this new...
Genetec UL Cybersecurity Certificate (2900-2-3) Examined on Dec 19, 2018
Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates? Earlier in 2018, a...
Scam Research And The $86 Billion IP Camera Market on Dec 19, 2018
Scam. The most widely cited research numbers in many, if not most, industries come from a growing number of Indian 'market research firms'. We...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
Axis: "No One Wants To Buy A Camera" on Nov 09, 2018
Axis has, in its own description, made a bold declaration: The industry is changing so rapidly that the following statement might seem bold but...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...

Most Recent Industry Reports

Testing Bandwidth vs. Frame Rate on Jan 23, 2019
Selecting frame rate has a major impact on surveillance bandwidth and storage consumption. But with smart codecs now common and cameras more...
Camera Course January 2019 on Jan 23, 2019
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training exists...
Bosch Favorability Results 2019 on Jan 23, 2019
Bosch's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2017, with 2019 results showing strong net...
Intersec 2019 Show Report on Jan 23, 2019
The 2019 Intersec show, held annually in Dubai, is now complete. IPVM attended for 3 days, interviewing numerous Chinese and Western video...
2019 Camera Book Released on Jan 22, 2019
This is the best, most comprehensive security camera training in the world, based on our unprecedented testing. Now, all IPVM PRO Members can get...
Milesight Company Profile on Jan 22, 2019
Milesight Technology, a Chinese company building an International branded business, says they are slowly building their presence through a series...
Cable Trenching for Surveillance on Jan 21, 2019
Trenching cable for surveillance is surprisingly complex. While using shovels, picks, and hoes is not advanced technology, the proper planning,...
Milestone Favorability Results 2019 on Jan 21, 2019
Milestone's favorability moderately strengthed, in new IPVM integrator statistics over their results from 2016. While the industry has been...
The IP Camera Lock-In Trend: Meraki and Verkada on Jan 18, 2019
Open systems and interoperability have become core features of video surveillance systems, as virtually all professional IP cameras integrate with...
NYPD Refutes False SCMP Hikvision Story on Jan 18, 2019
The NYPD has refuted the SCMP Hikvision story, the Voice of America has reported. On January 11, 2018, the SCMP alleged that the NYPD was using...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact