Dahua Forbes 'Next Web Crisis' Vulnerability Dispute

Author: Brian Karas, Published on Nov 16, 2017

The buffer overflow vulnerability in Dahua products is not in dispute, in fact we covered it when it was first published.

What is in dispute is how significant the vulnerability is, and the risks posed to users with unpatched devices.

This was recently showcased in a Forbes article, calling it bluntly 'the next web crisis', including a video demonstration of an 'Ocean's Eleven' Dahua hack:

IPVM has researched this, talking with Dahua, Forbes and the cybersecurity research firm who found this vulnerability, finding conflicting claims. Inside this report, we examine the vulnerability, the claims being made by each party and what this means for both Dahua and cyber security reporting.

********* ******** ************* ** ***** ********** *** ** *******, ** **** ********* ** **** ** *** ***** *********.

**** ** ** ******* ** *** *********** *** ************* **, and *** ***** ***** ** ***** **** ********* *******.

**** *** ******** ********* ** * ****** *******, ******* ** bluntly '*** **** *** ******', ********* * ***** ************* ** ** '*****'* ******' ***** hack:

**** *** ********** ****, ******* **** *****, ****** *** *** cybersecurity ******** **** *** ***** **** *************, ******* *********** ******. Inside **** ******, ** ******* *** *************, *** ****** ***** made ** **** ***** *** **** **** ***** *** **** Dahua *** ***** ******** *********.

[***************]

Vulnerability ******

*********** ************ ************, *** ******* **** ********* ******** *** ****** ******** *************, claim ** *** ** **** ** "****** ***" * ***** feed, ******** ********* ** ******* *** **** ****** **** *** camera **** * **** *** ** ***** ********.

**** ** "************" ** *** *****, ****** ** *** **** careful *********, ** ********* *** ***** ** *** ****** ******* of ******* *** *******, *** **** *** ******** ****/******** *** alternate ***** ***** *** ***** *** ***** ****** ***** ***** as ****-***** ******, ** **** *** **** ** ****** ****** running ***** *** ***** **** ****** *** *** ** ******** in * **** ****** *******.

Dahua *******

***** ************* ************' **** **** ** *** *******, ***** ****** **** *** *** *** *** *** ************* named ***** ****** ** **** **** * ****** ** ******* (DoS):

*************, *** ****** ******** ************* *** *** *********** ** ****** code *********. **** ** *** ******* ** *** *********. “…..****** a ******* **** ******* ** *** ********** *** ********* *** gain ********** ****** ********”.

*******, ** *** *** ********** * **** **** ***** ******* this ************* ***********. *** **** ****** ****** ** *** ******* is ***.

Details ********

*********** **** ******** ************ ***** *** ******* ********** ********* ******* beyond **** *** ********* ** *** *****.*****-**** ********, *** ********* *** ******* ** *** ****** ***** ******:

*** ******* **, **** ** **** ***** * *****-**-******* ** an ****** **** ***** ** *********** **** ** * *** system ** ** **-******. *** ** *** *********** ********** **********, we ****** ******** **** ******* ******* ** *** ** *** be ****. ** *** ******* ************* ** ******* **-******* ***************, and **’** **** **** *** ** ****.

**** *****, *** ******** *** ******* ************* *** ********* *** ******* used ** ******** ** *** ****** *****, ******* *** ********* description ** *** *******:

** **** ****** *** **** ***** ***** ******** ******* ** client **** ***** ******. ** ****** *** ***** *************. ** had *** ****** *** *** ** ***** ****** **** **** Linux ******.

******* **** ** ***** ** **** ****** ****/***** ****** ** the ****** ** ****** ******** ********, ***** **** ***** ** expected *** **** ** *******, *** ****** ********* ******* ****** specific *******. ******* ** ****** **** *** ****** ******** ************* (which ****** ** ******* ********* ******* **** **** ********) *** be ********* ** ****/**** ***** ********* ** *** ******, *** then **** *********** ** ** ******** ** * ***** ******.

Forbes ******* ************

***** *** ** ******** *** ********* *********** ** *** *******, the ****** ****** ******** ** ***** ******* *********** ************, ******** the ***********, *** *** *********** ** *** **-**** ********** (***** makes ** ******* ** *** ******* ** ***** ***** *******):

** **** ****, ** ****** ** *** ******* ******** *** watched *** ****** ******* ****, ******* ******** ** *** *********** and *** *********** ******** ** **** *** *** ** **********.

**** ****** ******* *** ************* ** *** ******* ********, ****** responds **** **** ********* ***** *** ** ***** *** ************ of *** ***** ******* ** ****** ********* ******* ** ** how **** ******** *** ******* (*.*., ********* ****** ****, ****** another *********** ******** **** ** ****** ********'* ***** ** *******):

*****, *** *** ******* **** ** ** *********** **** *** on *** *** ***** **** ** ***********? ****'* *********** **********? If *** *** **** ** * ****** *** ********** ********** it, ****** ******** ** ******** ** *** ** *'* *********.

** ********, ** ********* **** ***** **** ** ********** *** exploit ***** ** **** ** "*** ****" ** *** ***** of ******** ****** ** * **** ***** ***** ** ******** could **** ********* ******** *** ******* ******** ** ****. *** exploit *** ******** ***** ******** ** *** ****** ******* ******* as ****, ******* **** *** ******** ****** *** *** ******* would *** ** ****, *** **** *** *** ***** *** full ****-******* ***** ******.

Dahua *** ********

** ***** **** ****, ******** ****************** ***** ********** ********** *** "**** ** ***"*** ****** ******** *************. *******, **** ***** ** ** *** contacted ***** **** ******* ** *** ******* ** **** ****** that ***** *** ******** ***** **** (***** ***** *** *** feel **** ** ******* *** *********), ***** *********:

* ****'* **** **** ***** ***** **. * ***'* ***** they *** ****** *** **, ** **** **** **** ** change... **** ****** ** *** *** *** **** ****** **** another *** :)

More ********* ******* *****

***** ** *** ****** *****, ** ******* ** ***** ** cameras ***** **** *** * ******, * **** **** ****** scenario, ****** **** ***** ***** **** ** **** **** **** triggering * ****** ******** *******, ****** ********* ********** **** ** be ******* ****** **** *** ******. ***** ******** **** ** leveraging ** **** ****** ********** ** *** **** ****** ** a ***** *****.

***** ********* ** *****, *** ************* ******* *** ******* *** merely ***** ** ******* * ******. ***** **** **** ***** is *** ******* **** *** **** ********, ** ***** *** be ********* ** "****** ***' * ***** ****** ** **** cases, ****** ********* *** ****** ******** ***** ********* ** ****** done, *** ******* *** **** ****** ** ******** ** **** video ** *** ***** *** ********.

Cyber ******** ****

** ***** ******** *********, *** *** ***** ***** ** ********** insecure ******* ** ********, *****, ** **** *** ********** ** sensationalize ******** ***** **** ******** ********* *** ******* ***** **** omit ******* **** ********** ***** *** *****. **** *** ***** in ******** ***** ******** ************* ******** (*,*,*) **** ** ** ******** ** *********** *************** ** **** that ****** ********** ********* *****.

Comments (2)

***** **** ** **** **** ****** ***’* ******** ** *** likely ** ** **** ***** * ****** ******** ****, **** a ****** ****** ****** *** ** ***** *** ** ********* in **** ******.

**** **** ** *** **** **** ** * ******* ** verify, ***** ** ******* ** *********.

*** **** *** ******* ** ******* ******** ****** ******

# ***** ** *****: *********** ** **** ******* ***** ***** not ***** ********, ** *** ***** ******'* ** ****** ******* real **** **** *****

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Last Chance - July 2018 IP Networking Course on Jul 12, 2018
Registration ends today, Thursday. Register now. This is the only networking course designed specifically for video surveillance...
Hikvision Covers Up Racial Profiling And AI Error on Jun 25, 2018
Faced with global scrutiny, led by the US government-funded Voice of America (VOA), Hikvision has covered up evidence showing their racial...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Debating Relevance of China Hacking US Navy Plans on Jun 11, 2018
"Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to...
Remove Dahua and Hikvision Gov Installs Required By US House Bill Ban on Jun 06, 2018
The final released US House Bill HR 5515 verifies that it not only prohibits the purchasing of Dahua and Hikvision products, it requires removing...
Dahua's Terrible Cybersecurity, Buys Credibility From PSA And SIA on Jun 04, 2018
Dahua has a terrible cybersecurity track record. But American organizations, like the Security Industry Association (SIA) and the PSA Security...
Canon Responds To IP Camera Hacks on May 30, 2018
Canon cameras made international news earlier this month, with reports of them being hacked in Japan (e.g., Hackers disable scores of Canon-made...
Corruption Alleged Against Hikvision Procurement In India on May 28, 2018
Over the past month, allegations of corruption and national security risk have made the news in India over the planned purchase of 150,000...
Amazon's "Dangerous New Face Recognition Technology" Says ACLU on May 23, 2018
The ACLU has caused a stir, with a new report Amazon Teams Up With Law Enforcement to Deploy Dangerous New Face Recognition Technology,...

Most Recent Industry Reports

Free 100+ Manufacturer-Customized Camera Calculator Released on Jul 19, 2018
Now, any manufacturer has a customized IPVM Camera Calculator, free. The goal is to make it easier for companies to help their customers better...
Improved Security And Surveillance Bidding - 2018 MasterFormat Divisions Examined) on Jul 19, 2018
Navigating the world of system specifications and bidding work can be complex and confusing, but a standard format exists, and understanding it...
Last Chance - Security Sales Course Summer 2018 on Jul 19, 2018
Today is the last day to register. Based on member's interest, IPVM is offering a security sales course this summer. Register Now - IPVM Security...
Directory of Video Surveillance Startups on Jul 18, 2018
This directory provides a list of video surveillance startups to help you see and research what companies are new or not yet broadly known entity...
Ladder Lockdown and Ladder Levelizer Tested on Jul 18, 2018
Ladders are a daily necessity for surveillance and security installers, but working on an unstable surface can be extremely dangerous. In addition...
FST Fails on Jul 17, 2018
FST was one of the hottest startups of the decade, selected as the best new product at ISC West 2011 and backed with tens of millions in...
Axis ~$100 Camera Tested on Jul 17, 2018
Axis has released their lowest cost camera ever, the Companion Eye Mini L, setting their sights on a market dominated by Hikvision and Dahua. Can...
Amazon Ring Alarm System Tested on Jul 16, 2018
Amazon Ring is going to hurt traditional dealers, and especially ADT, new IPVM test results of Ring's Alarm system underscore. IPVM found that...
Hikvision Wins Chinese Government Forced Facial Recognition Project Across 967 Mosques on Jul 16, 2018
Hikvision has won a Chinese government tender which requires that facial recognition cameras be set up at the entrance of every single mosque...
Installing Dome Cameras Indoors Guide on Jul 16, 2018
IPVM is producing the definitive series on installing surveillance cameras. This entry covers one of the most common scenarios - installing dome...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact