Dahua Hard-Coded Credentials Vulnerability

Author: IPVM Team, Published on Nov 20, 2017

A newly discovered Dahua backdoor is described by the researcher discovering it as:

not the result of an accidental logic error or poor programming practice, but rather an intentional backdoor placed into the product by the vendor

This comes after other recent cyber security issues involving Dahua, including:

A group of ex-NSA researchers found these hard-coded credentials in Dahua products. The finding was picked up by The Washington Post and Fortune, but those publications failed to analyze the true extent of Dahua's most recent vulnerability.

IPVM spoke with Terry Dunlap, the CEO of ReFirm, the research company that discovered the vulnerability, as well as representatives from Dahua, to analyze its potential for impact. Will it be the next Mirai? Details are in this note.

* ***** ********** ***** ******** ** ********* ** *** ********** discovering ** **:

*** *** ****** ** ** ********** ***** ***** ** **** programming ********, *** ****** ** *********** ******** ****** **** *** product ** *** ******

**** ***** ***** ***** ****** ***** ******** ****** ********* *****, including:

* ***** ** **-*** *********** ***** ***** ****-***** *********** ** Dahua ********. *** ******* *** ****** ** ***** ********** **************, *** ***** ************ ****** ** ******* *** **** ****** of *****'* **** ****** *************.

**** ***** ********* ******, *** *** ********, *** ******** ******* **** ********** *** *************, ** **** as *************** **** *****, ** ******* *** ********* *** ******. Will ** ** *** **** *****? ******* *** ** **** note.

[***************]

*******

* ****-***** ******** *** ******** *** ** **** ** ****** rogue ******** ** ******** *******, ********* ******** ************** ******* **** control ******** ********. **** ****** ** ******** ** ***** ***** own **** (*.*., *****-***** ****** ****) **** ********** ******** *** load ** ******** **** ***** *******. *** ************* ** **** easy ** *******, ****** ** ****** ** * ******** **** being ******** ********** (**** ****), ***** *** **** ***** ******* impact.

***** *** ******** ******* ********, ****** *** *** ** ******** by *** ******** *******.

Vulnerability ********

****-***** *********** (********/******** ** *****/*****) **** ***** ** * ******* called "********", ***** ******* ** **** **** *** ** **** to ******** ****** ******** *******. *** ************* *** ***** ** Dahua ******** ******* *.***.****, ****** ** ** *** ******* ** only **** *******. **** ******* ** *** ************* *** ******** in******'* ******** **** ************* ******, ******** ** **** **.

*** ***** ***** ** * ********** ****** ******** **** ***** analysis ***** ***** ***** *** ****-***** *********** ****** ** *** code:

********* ** *****, *** ************* *** **** ** **** *** firmware ******* *********, *** *** *** ** **** ** **** remote ****** ** ******** ******* ** ******** *** **** ****.

Exploit ********* ****

****** ****** ** **** ********* * ***** ** ******* *******, where **** **** **** ** ****** * ***** ******** ***** that ******* ** *************** ****** *******, ******** **** ****** **** a ***** ***** ** *** ******. **** **** ***** ** attacker ***** **** **** ***** ** *** ******, ******** **** to ****** * *** *****-***** ******, ****** ** ***** ***** data ** *** ******, ** ********* **** *** *********. ********* could **** ****** ******** ******** **** ******* *** ****** ********** installed, ****** * ****** **** ********* ****** *******, ********* *** original ***** ******.

Affected *******

***** ****** * ******** ************, ***** **** ***** * ******** ********, ********* * ** camera (***-********) *** * *** (*******, ***** ***** **** **** in *****). ***** ** ******* ******** *** **** ********* ** the ******** ************.

****** *** ****: ***** ********** ***** ******** ************, ****** * ** ******* *** * **** ***.

****** **** ****** ** **** ***** *** ************* ** * wider ***** ** ********, ******* "******** ** ******* ***** ******** images **** ******** ***** ****** ****** ******** **** **** ***** camera ******** ******* **** ***** **** ******** *******, ********* *** “dahua” ****-***** ******** ***********."

***** ****** "*** ******** ******* ***** **** **** *** *** affected", *** **** ********* **** *** ***** ********* ******** **** older ********. ***** ** ****, ** ***** ********** *** **** of ******** ******** ***** ******* ** ***** ********* ** *********** affected *******.

Overall **** ******

***** *** ****** ******* ** **** ******* ** **** ****, meaning ** ***** ** ******** ** **** ****-********** ***** ***** for ****** ****** (****** ***** ****** *** ****** ** * DMZ), ******** ******* ********* ** ***** *** ****. *****, **** presents * **** ** ******* *******, ** ********* ******* ****** to *** *** ******* ***** ***** (**** ****, ***** *********** devices, ***.), *** **** ************* ****** *** ** ********** ****** simply ******* ** ***** ********* ** **** *******.

Fix ********

****** ****** **** ********** *** ****** ******** **** *** **** Dahua ********, *** ***** *** ****-***** *****/***** *********** ***** *******, as **** **** **** ** ****** * ******** ******* ** a ****** ******* *** ********** ******* ********. ***** ****** **** have **** ****** ** ********* ******'* ********, *** **** *** hard-coded **** **** *** **** ******* **** ****** ********. ** of *** **** ** **** ***********, ***** ** ********** ** contact ****** ** *** **** ******* ** ***** ***** ** the ************* ***** ******** ** *** ********* ***** ********.

Dahua ******** *********

*****'* ******** ** **** ************* ****** *** **** ******* ****** than ******* *************** ** *** ****. **** **** **** ********** to ********* **** **** *** *******, *** **** ******* ***** Security ************ ** **** **** ********** ******* ********** *** *************. To ***** ******, **** **** ******** ****** ******* ***** *** vulnerability *** *********, ** ****** **** ******** ***** * **** in ******* ** ***** *******, ****** **** *********** ***** ******* are ***** **-** **** ******* ****** ** *********** ** ******* a ********.

ReFirm **** ******** *******

****** ** * *********, ** ***** ******** ******** ******* ******* by **-*** ******** ********. *** ******* **************** $*.** ** ******* *******, *** **** *********** **** **** ** ******* ***** ***** analysis ****** ** ******* ***** *******, **** ** ******* *** The ********** ****.

*** ******* *** ********* * ******* ****** "**********", ***** **** claim *** ******** ******** *** ******* *** ******* ************* ** detect *************** **** ** **** *****. ****** **** ******* *** Centrifuge ******** ** * **** ***** ** ********** ** ***-***** who **** ** *** ** *** ********* ************* ********.

****** **** ******* *** ** **** ******** *** ******** ** advance ** *** *******, ***** ** ******* ***** ** ***** get ******** **** *****.

Comments (16)

* ***** **** ** **** *****'* *********** *** *** '*********** backdoor ****** ** ** *** ******* ** *** ******' **********...

** ** ** ***** ******** ****** ****** ** *** ******:

*******:

******** ******* ************** ****** ************* *** ***** ** ***** ***-******** and **** ** ********. *** ************* *** ****** ** ******** Debug ********. **** ********** ******** *** **** *** ******* ******** and *********** ****** ****** ******* *********** *****. ** ******* *** device ** ******* **** ******** **** (*** *********, ** ********) and ********* ** *** *** ******** ** *** ******** ** collecting **** ******* **** ** ******** ****** **** *********.

******** ******* **** ***** ***** **** ** *** * ***** by ****** ** ***** ** ****** **** *****, *** **** no ***** ***** ******* ******** *** ********. ** ****’* ***** REAL **** ** **** ******.

** ************* **** ***** ** ****, **** ********* *** ************* found ** ******, ** * ** *** ***** ** ** fair ** **** ** * "*****" **** ***** *** *** dispute *** *************.

***** ***** *** *** *** ********** *** **** **** ***** was * *****-**** *****, **** *** *** ***** **** ******-******** ****** *** ******* **** ** ******** *******. **** **** do *** ***** **** ** ***** ******** ******. ** ** is ****, ***** ****** ******* **** *********** ** **** ** their *******, *** ******* * ******-**** ******* ** ****

****** ****** ******* ********** ******* ** ***** ****** ***** **** Dahua ************* *** *********. *** ****** ********* ****** ** **** attention ** ***** *******, *** *** ***** ******** **** **** doing ****, ** ***** ** ****, * ****** ** *** publicity. *****, **** **** *** ******* **** *** **** **** they ***** * ************* **** ***** ******** **.

*** ** **** *** "*****" ****** **** *** *** "******** sources **** *****" ****. ****** *** * **** **** **** that. ** ***** *** **** ** "*********" ** **** ** you ****.

“******** ******* **** *****”

***** ** ***** “**********”.

"** ******* *** ****** ** ******* **** ******** **** (*** direction, ** ********) *** ********* ** *** *** ******** ** any ******** ** ********** **** ******* **** ** ******** ****** code *********."

+* *** *** ***** *** ** ***** ********* **** **** put **** ******** ** ********** - ****** ********* (****: *** continue ** **** *** *******.)

-* *** *** ***** *** ******** ** ***** *** '***-**************' by ********* ***** ********* ** *** **** **** ** '********'. (ignoring, ** ******, **** *** ********* ** *** **** **** itself ** **** ***** ***** ****** *********** ********* - *** vulnerable ** ******** **** *** ***** *** ******)

**** ******* *** **** **** ** **** ** ** "****** around" **, *** *** ** **** * ***** ******.

****: *****, * ***** **** ** *******, ** ** ******** allow *** ** ****** *** ******** ** ** '*********', ** the *** **** ****** **** **** ** ****.

********* ******* ** ***** *** **** ** *** "***" *** the **** ***** **** ***** ** ********.

******'* **** **** * ****** *** ***** *** ******** ****** already **** ********* *** **** **** ******* ****'* ****** ****** that *** *** **** ****** ******** **** * **** ***?

***'* ******, ***** ****** ******* * *** **** **** *** a ************* **** **** *** ******** ** ****.

**** **** ******* ****-****** *******!

****** **'** *** **** ***** **** ******** ***** **** ****. So *** ** **** ************* ******** ***?

*** **** ********* *** **** ******** **** *** *** ******* changing *** ****? ** * ***** ** **** ** ******* them *****?

********* ****** ** ********** ** ***** *** *** **, ** I ***'* *** *** "*****" ******...

******:***** ********** ***** ******** ************, ****** * ** ******* *** * **** ***, *******:

***** **** **** **** "******* ****** *********** ** ********** ******** products *** **********."

***** ** ***** *** ********** **** *********** *** *********** ******* it **** **. *******, ** ** ******** ********* **** **** cannot **** ******, ************** *** ******* ****** **** ** ** the ******** *** ******* ********. ****** ************ ***** ** ******** on ****?

****, ** ***** **** **** ******** **** *** ****** *** press ******* ***** **'** *** **** ******** *** ** ****'* particularly *** **** ***.

*** ******* ******* **** ***** *** ******** *** ****** **** older *********. *** ****** *** ***** ******* ** ******.

** ******* **** ***** **** **** * **** **, "** got ****** *** ** *** ************* *****, *** ** ***** this **** ** ******* *** ** ***** **** **, ********* we ***** **** ***** *** ** *** ******** ***** ** to ******."

*********, ***** *** ***** ** **** **** ** ***** **** 3800 ********** (***** ******** *** **** ****** ** *** ******** from **** ****-**** ******). *******, * *** ** **** ******* of *** ******* ** *** ******** *******/***********, ** *** **** is **** "***"?

**** **** *** *** ******* ****** *** ** ********* ********** and ********* *** * *** ** ***** **** ****** ** upgrade ** *** ******* ****** ******* * ******** ******* *** can ***** ** ******. * ***** ********* *** **** ***** works ***** ***-**** **** **********, *** * *****'* ****-******* ****** units ******** ** ****.

*******, * *** ** **** ******* ** *** ******* ** the ******** *******/***********...

** ***** **** **** “*****”,“*****” *** *** *********** *** ****** conditional ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Most Recent Industry Reports

Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
ASIS Offering Custom Research For Manufacturers on Nov 15, 2018
Manufacturers often want to know what industry people think about trends and, in particular, the segments and product they offer.  ASIS and its...
ISC East 2018 Mini-Show Report on Nov 15, 2018
ISC East, by its own admission, is not a national or international show, billed as the "Largest Annual Northeast U.S. Security...
Hikvision Silent on "Bad Architectural Practices" Cybersecurity Report on Nov 14, 2018
A 'significant vulnerability was found in Hikvision cameras' by VDOO, a startup cybersecurity specialist. Hikvision has fixed the specific...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Integrator Credit Card Alternative Divvy on Nov 13, 2018
Most security integrators are small businesses but large enough that they have various employees that need to be able to expense various charges as...
Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...
Magos Radar Company Profile on Nov 12, 2018
Magos America General Manager Yaron Zussman admits when he first came across Magos, he asked himself: "What's innovative about radar?" Be that as...
Genetec Privacy Protector Tested on Nov 12, 2018
Genetec has built Kiwi Security's Privacy Protector into Security Center, an analytic which anonymizes individuals in cameras' fields of view...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact