Dahua Manager: Lots of Backdoors Beyond Dahua or Hikvision

Author: John Honovich, Published on Mar 29, 2017

A Dahua technical manager has fired back at criticisms of Dahua's backdoor, posting publicly what many at Dahua have privately been saying for the past few weeks that their backdoor is no big deal because lots of companies have backdoors and that Dahua and Hikvision get unfairly criticized for their problems.

* ***** ********* ******* *** ***** **** ** ********** *******'* ********, ******* ******** **** **** ** ***** **** ********* **** saying *** *** **** *** ***** **** ***** ******** ** no *** **** ******* **** ** ********* **** ********* *** that ***** *** ********* *** ******** ********** *** ***** ********.

[***************]

*********

***** ********* ******* *********:

********* * ********* *******, ** ******** ** ***** ** **** issues,********:

** ** * ************* ** * ************* ** * ***** extent.

Simplicity *** ******** ** ***** ********

*****'* ******** ** *** **** ****** *** ******* ** ******* than *** ************* **** ****** ** ********** ***** ************ ********. This ** *** ******, *** ********** *** ********** **,*********:

**** ** **** * **** ********* ****, ***** ** *** button *** *** *** **...

*****, ***** *************** *** **** ** *******. *** *******, ********* ********** **** ********************* * *********** ** **** **** ***** ** *** ** achieved. ** ********, *** ***** *** ***** ****** *** ***** by ****** *********** *********** *********** **** *** ****** *** *********** running **** ** *** ***** ******.

Implication - *** ***** **** ********

** ********* ******* ** **** ******* ** **** ** ******** essentially *** '**** **** *******' **** ** *** ****** **** purchasing ********* ***** *** *** *********. ********* *** *********** * commodity - ******** '******' ****. *** ***** ****** **** **** to *** ** ******** ***** **** ******** - **** ***** and *********.

**** **** **** *****. **** ** *********** *** ******** ** video *******, *.*., **** ***** *** *********'* ***** ******* ** basically *** **** ** **** ** ********, ** **** *** the ******* ***. *** *** ******* ************* **** **** **** selling ** **** *****. ** **** *** ******** **** *** cybersecurity ***** **** * ******* *****, **** ***** ****** *** lower **** ******* ***** *****.

Dahua *** ********* ****** *** ** ** *** **** ** *************

******* ** *********** *** ****** ** ********* *********, ***** *** Hikvision ***** ** ****** ** ***** ** ***** *** '****' at *************. **** ***, ** ***, *** *** ******* **** market ***** ************ ********* ***** ******* *** **** ****** ** wind ** '***********' ** *** ****** ********. *** *******, **** ******* ***** ******* ******* ** *** ********. ******* ** ****, *** ************* ********** **** *** **** the ******* ******* ** *** ***** ** *** ******* **** can **** ** ***********. ******, ******* *** **** ****** ** target ***** *** ********* *** *** **** ****** **** **** historically ******** *********, ***** ***** ********* **** *** **** ******* that *** ** ******** **** ***** **** ***** ******.

Comments (16)

***********, **** *****'* **** ****** *** ***** ** ***** ******* utilizing ****** ** **** ********* (****** *** ***) ***** ********* usernames *** ********* ** ***** **** ******. **'* ****, ********'* doing **.

***** ** *** ********** ******* ************* *** ********.

*'** *** ** **** ** *****;

*********:
**** ************* **** * **** ***** ******** *** ******** ******** have ****** **** ********** *********, ***** ** ********, *** ****** therefore *** ** ******* ** ********, ****** ***** ** ******** pattern.

**********:
***** ******** ******* *** *****, ****** ******** *******, **** **** different ******* ********** *** **** **** ***** *****, *** ******* - **'* ************.

**'* ************ *** **, *** *** **** ** ** **********???

***** ******** *****, ***** **** **** *****?

******* * *** *** **** ** ***********: ***** *** * well ******** ********** *** ***** ********* ***** ******* ** ****** competitive ********** ********* ** ** ******* ********* ******* ******* *******. They *** **** *** ******** ***** ** *** *****'* ******* video ************.***** ******* ***** ********* *********** ***** ** ********* ***** ******* ********* do *** **** ************. ** * ******* ***** *** ***** has ******* *** ***** *** **** ************* ** **** ***** prudent ** ** ********* ***** *************** *** **** **** ****** to ** *********** *********.

** ** ************* *************** ** *******, ** ******, ** *******, my ********* ******* *** ** *** ******** **** ** ******* security ******** *** ******* ****** ** ******** ******* *************** **** discovered. **** ***** ** ***** ******** ** *** "********* *** vulnerabilities, ***'* *****" ********.

** *** ***** ******* *** '**** ******* ***** * ********** & ******* ********** ****?'

**** ******, *** **** ***, ***** **** ** ******** *************** will **** *** ** ******, ***** **** *** *** *********** giving **** **** *********** *** ********* ** **** *******! *** the ********** ** ***, **** ******* ********* *** ***** ****. For **, ** ** ******* ** ******* *****

** ****** ***** ****? ***** *** ********.

**** ****:
* ***** **** ***** *******, ***** ** ********* *********** ** all ********, **** *** ***** *** **** *** ******, *** they *** ***** *** ****.

******* ******* ************* *** ********:
**** ******************** ****** ******, ***** **** ******** ******* **** **** ***** ** ******** and ******** ********, *** ***** ** ** **** ********** ********* for ** ***** ** *********** ** ********.

* ***** **** ** ********** *** **** ** ********, ***** in ** ******* ** ***** ** ****** ***, *** * can't *** ** *** ********* ***** **********.

*******, ** ** ***** ******** ** *** ****** ****** ** technique *** *********, *** **** **** ***** **** **** ******** patterns.

**#* **** ***'* ******** ** *** *** * ****** *********** based ** **** *******. **** *** ** **** ***** **** on **** *** *** **** **** **** ****** ********* **** what * *** ****.

**** ***** ***** ****** ** ****** ******* ** ****** *** Hikvision *** ***** ***************, ******* ***** *************** *** *** ******* intent ** **********, ** ********** ***** ***************. **** ********** **** ** ****** ***** *******. A ****** ****** ** ****, *********, *** ***** ***** *** following ******** ** ****** ********** ******* ****** ** ***** *** exploits.

***** ******* *** *** **** ******* *** *** **** **** change *** *********** ** ******* ** ****** ******* **** ********* than * ***** *** ****** ******. **** ***** **** ***** cameras ****** ** ******.** ********* ******** ** **** ********* *** *** ***** ******* * **** ****** ****** **** Hik/Dahua.

**************, ** *** **** ******* *** ********** ******** ***** *** aim *** *** ******** **** ** *** **** ********? **** the *********** ** * ****** ***** ****** ** **** ********** is **** ******* ********* *** *** *********** ******.

whatever

*** ****** *********.

******, *** **** ** **'* ***** ** *****/********* ** ****, I ****** ***'*.

/******

* *** ******* *** *** **** **** ** "***** *******", but ** ***** ** ** ****?

* *** ******* *** *** **** **** ** "***** *******", but ** ***** ** ** ****?

***, * ******* ** *** **** *******. * ** *** see ** ** *** ******** ****** ** *** ****** **.

***** *** ********* **** **** * ******* **** ***** ********* posting ** ****** *****. *** *******,********* ******** ***** *****.

** **** ******* ** ******** ***** ****** * ******** ********, or * ***** ***** ** ******* *** ******** **** ****** effort.

*** ******** ****** ******** *** ** **** ** *** ******, even *** ********* ** * ***** ****** ** *** ****** adds ** *** ****.

** *** *** ****** ****** ** ***** * ******** ***. It's ****** *** *** ******** ************* ** ** *********.

**** ****** ** **** ** ********* *** **** ******* *** we ****** *** *** **** * **** *** *** **** done ** **** ** ***** ** ** * ******** *******.

* *******+ ******* ****** **** ***** ****** ** * *** thing ** ***.

* ***** *** ************ *** ******* ** ******** * **** based ****** ******** (***** ** **** **** ** ***** ****) as * "********". ** **, * ******** ** * ***** to ****** ****** ** * ****** **** *** *** **** published ** **** ** *** ******* *************. ***** * ****** password **** ***** *** ** *** **** * ******, *** through *** ****** ***** ** ******. * ******** ** * way ** ********* *** ****** ****** ** ****** * ****** and ******* ****** ** ** ** * ***-******** ****** (**** as *** ****** ******* ****).

* *******, ***% ***** **** *** **** ***** ******** **** no ******** ***** ******** ** ** "********" *******.

******* ********* ** ** **** *** ******** ***** ***'* * problem ** *** ***** ******* ** **** *** ********* ** an *** ****** **** ******** ** *** ******** ** *** NVR **** "****** *** ********" ** * ****** **********.

** **** *******?

*** *** ******* ****** ** **** *****...

********, **. *** **** ****** ********/***/******** **** *** ******* ******** didn't **** ** **** **** ****** *** **** ****** *******. This ******** *** ** *** **** (*******, **, ** ****) and *** *** (***** *****, **** ****).

******** ** ***** **, **** ***'* **** * ********* **** base ** **** ********** **** ***** **** *** ********* *********.

**** *** ********** ** ******* *** ******** ********** *** *** customers.

** *** ******* ******, * **** **** **** ***** **** new *** ******** ******** **** *** ****** ***** *******.

******* *** **** **** ****** *** *** ****** *** *** interfaces ** ********** ******* **** ****** ***** ** *** ********! Yay *** ******** ******* ***** **, *****?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...
July 2018 IP Networking Course on Jul 12, 2018
Registration is closed. This is the only networking course designed specifically for video surveillance professionals.  Lots of network training...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Debating Relevance of China Hacking US Navy Plans on Jun 11, 2018
"Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to...
Remove Dahua and Hikvision Gov Installs Required By US House Bill Ban on Jun 06, 2018
The final released US House Bill HR 5515 verifies that it not only prohibits the purchasing of Dahua and Hikvision products, it requires removing...
Dahua's Terrible Cybersecurity, Buys Credibility From PSA And SIA on Jun 04, 2018
Dahua has a terrible cybersecurity track record. But American organizations, like the Security Industry Association (SIA) and the PSA Security...
Canon Responds To IP Camera Hacks on May 30, 2018
Canon cameras made international news earlier this month, with reports of them being hacked in Japan (e.g., Hackers disable scores of Canon-made...
Corruption Alleged Against Hikvision Procurement In India on May 28, 2018
Over the past month, allegations of corruption and national security risk have made the news in India over the planned purchase of 150,000...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...

Most Recent Industry Reports

Video Analytics Integration Guide on Aug 16, 2018
Video analytics is hot again (at least conceptually) but integrating video analytics with VMSes can be challenging. This is especially significant...
Hikvision IP Camera Critical Vulnerability 2018 Disclosed on Aug 16, 2018
The same day that the US government passed a prohibition on Hikvision cameras, Hikvision disclosed a critical vulnerability for its IP...
ISS VMS / Video Analytics Company Profile on Aug 16, 2018
Who is ISS? In the past few months, they had one of the craziest ISC West promo items in years. Then, they hired industry veteran and ex-Dahua...
Chinese OEM Avycon Gets ADI Push on Aug 15, 2018
Who is Avycon? An American company? A Korean company? A couple of guys relabelling Chinese products? The latter is the best explanation. While...
Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Genetec Stratocast / Comcast 'Motion Insights' Examined on Aug 15, 2018
Comcast recently announced "SmartOffice Motion Insights", an extension to their Genetec OEMed cloud video service (covered by IPVM here). This...
Ban of Dahua and Hikvision Is Now US Gov Law on Aug 13, 2018
The US President has signed the 2019 NDAA into law, banning the use of Dahua and Hikvision (and their OEMs) for the US government, for US...
Cut Milestone Licensing Costs 80% By Using Hikvision and Dahua NVRs (Tested) on Aug 13, 2018
Enterprise VMS licensing can be quite expensive, with $200 or more per channel common, meaning a 100 camera system can cost $20,000 in VMS...
Nortek Sues SDS, Battle Over Unpaid Bill and Cancelled Lines on Aug 13, 2018
Nortek and SDS legal battle continues. As IPVM reported, SDS sued Nortek alleging bribery and antitrust violation. However, Wave fired back at SDS,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact