Dahua Manager: Lots of Backdoors Beyond Dahua or Hikvision

By: John Honovich, Published on Mar 29, 2017

A Dahua technical manager has fired back at criticisms of Dahua's backdoor, posting publicly what many at Dahua have privately been saying for the past few weeks that their backdoor is no big deal because lots of companies have backdoors and that Dahua and Hikvision get unfairly criticized for their problems.

* ***** ********* ******* has ***** **** ** criticisms *******'* ********, ******* ******** **** many ** ***** **** privately **** ****** *** the **** *** ***** that ***** ******** ** no *** **** ******* lots ** ********* **** ********* and **** ***** *** Hikvision get unfairly ********** *** ***** problems.

[***************]

*********

***** ********* ******* *********:

********* * ********* *******, in ******** ** ***** vs **** ******, ********:

** ** * ************* is * ************* ** a ***** ******.

Simplicity *** ******** ** ***** ********

*****'* ******** ** *** more ****** *** ******* to ******* **** *** ************* seen ****** ** ********** video ************ ********. **** is *** ******, *** researcher *** ********** **,*********:

**** ** **** * damn ********* ****, ***** on *** ****** *** you *** **...

*****, ***** *************** *** hard ** *******. *** example, ********* ********** **** ********************* * *********** ** very **** ***** ** all ** ********. ** ********, the ***** *** ***** across *** ***** ** simply *********** *********** *********** from *** ****** *** immediately ******* **** ** get ***** ******.

Implication - *** ***** **** ********

** ********* ******* ** this ******* ** **** if ******** *********** *** 'back **** *******' **** no *** ****** **** purchasing ********* ***** *** has *********. ********* *** effectively * ********* - everyone '******' ****. *** focus ****** **** **** to *** ** ******** ***** cost products - **** ***** and *********.

**** **** **** *****. That ** *********** *** argument ** ***** *******, i.e., **** ***** *** Hikvision's ***** ******* ** basically *** **** ** Axis ** ********, ** just *** *** ******* one. *** *** ******* manufacturers **** **** **** selling ** **** *****. If **** *** ******** turn *** ************* ***** into * ******* *****, than ***** ****** *** lower **** ******* ***** *****.

Dahua *** ********* ****** *** ** ** *** **** ** *************

******* ** *********** *** trying ** ********* *********, Dahua *** ********* ***** do ****** ** ***** ** being *** '****' ** cybersecurity. **** ***, ** far, *** *** ******* mass ****** ***** ************ providers ***** ******* *** most ****** ** **** up '***********' ** *** public ********. *** *******, the* ******* ***** ******* exposed ** *** ********. ******* ** ****, any ************* ********** **** hit **** *** ******* because ** *** ***** of *** ******* **** can **** ** ***********. Indeed, ******* *** **** likely ** ****** ***** and ********* *** *** same ****** **** **** historically ******** *********, ***** these ********* **** *** more ******* **** *** be ******** **** ***** more ***** ******.

Comments (16)

Interesting, this doesn't even broach the topic of these devices utilizing decade or more utilities (Telnet and FTP) which broadcast usernames and passwords in plain text format.  It's okay, everyone's doing it.

There is big difference between vulnerability and backdoor.

I'll try to make it short;

Statement:
True vulnerability over a wide range products and firmware versions have always some unexpected anomalies, which is expected, and should therefore not be treated as backdoor, unless there is distinct pattern.

Conclusion:
Dahua backdoor lacking all above, except distinct pattern, even with different hashing techniques for more than three times, and besides - it's undocumented.

 

It's undocumented for us, but for whom is it documented???

Their intended users, would that make sense?

Perhaps I can put this in perspective: China has a well deserved reputation for state sponsored cyber efforts to gather competitive technology advantage or to conduct espionage against Western nations. They are also the majority owner of the world's largest video manufacturer. Phone Home and other potential exploitable means to penetrate video systems worldwide do not seem uncalculated. In a country where the State has express and final say upon manufacturers it just seems prudent to be concerned about vulnerabilities and also what appear to be intentional backdoors.

As to unintentional vulnerabilities to exploit, my iPhone, my Android, my operating systems and my web browsers seem to release security upgrades and patches weekly to speedily address vulnerabilities when discovered. That seems in sharp contrast to the "Everybody has vulnerabilities, don't worry" response. 

In the legal setting ask 'what actions would a reasonable & prudent individual make?'

Good points, and with P2P, these kind of backdoor implementations will then not be needed, since with P2P you practically giving away your credentials and addresses to your devices! and the connection to P2P, your devices initiates and keeps open. For me, it is similar to reverse shell

Do anyone trust them? thats the question.

 

 

Side note:
I agree with Dahua Manager, there is backdoors implemented in all products, some are local and some are remote, but they are there for sure.

Example between Vulnerability and Backdoor:
Axis Communications Remote Format String, shows very distinct pattern over wide range of products and firmware versions, but there is to many unexpected anomalies for it could be categorised as backdoor.

I would love to categorise the Axis as backdoor, since in my opinion it would be genius one, but I can't due to the anomalies while exploiting.

However, it is fully possible to use Format String as technique for backdoors, but with this comes also very distinct patterns. 

UE#2 this isn't directed at you but a direct observation based on your comment.  This may be your first post on IPVM and you make have just joined yesterday from what I can tell.

What keeps being missed by people looking to debunk the Hikvision and Dahua vulnerabilities, whether those vulnerabilities are via willful intent or negligence, is the scale of those vulnerabilities.  IPVM emphasizes this in nearly every article.  A simple search of Axis, Hikvision, and Dahua shows the following quantity of easily identified devices primed to probe for exploits.

Those results are not even looking for any OEMs that change the identifiers of product or having someone more competent than I using the search engine.  Axis could make their cameras listed on Shodan.io require no password or user account at all and still present a less viable target than Hik/Dahua.

Metaphorically, if you went hunting for sustenance purposes would you aim for the gigantic deer or the tiny squirrel?  From the perspective of a hacker their return on time investment is much greater targeting the big unprotected target.

whatever

Not joined yesterday.

Listen, who care if it's giant as Dahua/Hikvision or Axis, I surely don't.

 

/bashis

I was looking for the post made by "Dahua Manager", but it seems to be gone?

I was looking for the post made by "Dahua Manager", but it seems to be gone?

Yes, I believe it has been removed. I do not see it on the LinkedIn thread it was posted in.

Dahua and Hikvision both have a problem with their employees posting on social media. For example, Hikvision Director Mocks Dahua.

In most Chinese IP products there exists a password backdoor, or a means which to recover the password with little effort.

The domestic market products are so keen on low prices, even the existence of a reset button on the device adds to the cost.

So now the simple choice is using a software one. It's common and the security consideration is no relevance.

Only thanks to IPVM to highlight the true picture can we really see how such a poor job has been done on what is meant to be a security product.

A million+ devices having some basic issues is a sad thing to see.

 

I would not characterize the ability to generate a date based master password (which is what most do these days) as a "backdoor".  To me, a backdoor is a means to obtain access to a device that has not been published as part of the product documentation.  Using a master password will allow you to get into a device, but through the normal means of access.  A backdoor is a way of bypassing the normal routes to access a device and gaining access to it in a non-standard manner (such as the telnet console port).

I totally, 100% agree with you that these products have no business being referred to as "security" devices.

Someone commented to me that the Backdoor issue isn't a problem on the dahau cameras if they are connected to an NVR rather than directly to the internet as the NVR will "handle the security" of a remote connection.

Is this correct? 

The NVR devices suffer of same stuff...

Actually, no. The most recent backdoor/bug/whatever that got patched actually didn't work on most NVRs except the 5xxx series devices. This includes all of the 4xxx (vanilla, 4K, or 4KS2) and the 6xx (intel based, same deal).

Whatever is going on, they don't have a universal code base or true modularity with their APIs and interface protocols.

This was discovered by testing and patching internally and for customers.

In the process though, I have some news about some new NVR firmware features from the latest March release.

Vanilla and 4KS2 4xxx models now can access the web interfaces of individual cameras from inside built in PoE switches! Yay for properly playing catch up, right?

Read this IPVM report for free.

This article is part of IPVM's 6,367 reports, 855 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

Dahua Critical Cloud Vulnerabilities on May 12, 2020
Dahua has acknowledged a series of cloud vulnerabilities that researcher Bashis discovered. Additionally, and separately, researcher Thomas Vogt...
Bad: Dahua Villa Video Doorbell Tested on Jan 11, 2019
Doorbells are one of the hottest segments in the residential market but Dahua's Villa Video Doorbell is the worst we have tested. We bought and...
Dahua's Terrible Cybersecurity, Buys Credibility From PSA And SIA on Jun 04, 2018
Dahua has a terrible cybersecurity track record. But American organizations, like the Security Industry Association (SIA) and the PSA Security...
Hikvision HQ Contradicts Cybersecurity Director on Mar 07, 2018
Hikvision HQ has contradicted Hikvision USA's Director of Cybersecurity, Chuck Davis [link no longer available]. Davis - Don't Put Cameras On The...
Dahua Hard-Coded Credentials Vulnerability on Nov 20, 2017
A newly discovered Dahua backdoor is described by the researcher discovering it as: not the result of an accidental logic error or poor...
ASIS Show 2017 Final Report on Sep 27, 2017
ASIS is in Dallas for 2017 and this is our final show report (compare to our 2016 ASIS show report). When walking in, one is greeted with Dahua's...
Dahua Suffers Second Major Vulnerability, Silent [Finally Acknowledges] on Jul 25, 2017
Less than 3 months ago, Dahua received DHS ICS-CERT's worst score of 10.0 for their backdoor. Now, Dahua has received another 10.0 score for a new...
ONVIF Chairman Criticizes Low Cost Cameras (Also, He Works At Axis) on Jul 12, 2017
ONVIF Chairman Per Björkdahl [link no longer available] has taken a strong public stance against low cost cameras that are 'much more vulnerable to...
Hikvision Blaming Backdoor On Others, Cannot Hide From DHS on May 11, 2017
Numerous Hikvision employees are blaming their backdoor on others but Hikvision cannot hide from the US Department of Homeland Security. Blaming...
Dahua Favorability Results 2017 on Jan 19, 2017
Dahua, the mega-Chinese surveillance manufacturer not primarily owned by the Chinese government has been trying to break out of the shadow of...

Most Recent Industry Reports

Hikvision Illicitly Uses Back To The Future In Marketing on Jul 03, 2020
NBCUniversal told IPVM that Hikvision UK's ongoing coronavirus marketing campaign using NBCUniversal's assets was not allowed. Hikvision mass...
Verkada: "IPVM Should Never Be Your Source of News" on Jul 02, 2020
Verkada was unhappy with IPVM's recent coverage declaring that reading IPVM is 'not a good look' and that 'IPVM should never be your source of...
Vintra Presents FulcrumAI Face Recognition on Jul 02, 2020
Vintra presented its FulcrumAI face recognition and mask detection offering at the May 2020 IPVM Startups show. Inside this report: A...
Uniview Wrist Temperature Reader Tested on Jul 02, 2020
Uniview is promoting measuring wrist temperatures whereas most others are just offering forehead or inner canthus measurements. But how well does...
Dahua USA Admits Thermal Solutions "Qualify As Medical Devices" on Jul 02, 2020
Dahua USA has issued a press release admitting a controversial point in the industry but an obvious one to the US FDA, that the thermal temperature...
Access Control Online Show - July 2020 - With 40+ Manufacturers - Register Now on Jul 01, 2020
IPVM is excited to announce our July 2020 Access Control Show. With 40+ companies presenting across 4 days, this is a unique opportunity to hear...
Hanwha Face Mask Detection Tested on Jul 01, 2020
Face mask detection or, more specifically lack-of-face-mask detection, is an expanding offering in the midst of coronavirus. Hanwha in partnership...
UK Government Says Fever Cameras "Unsuitable" on Jul 01, 2020
The UK government's medical device regulator, MHRA, told IPVM that fever-seeking thermal cameras are "unsuitable for this purpose" and recommends...
Camera Course Summer 2020 on Jun 30, 2020
This is the only independent surveillance camera course, based on in-depth product and technology testing. Lots of manufacturer training...
Worst Over But Integrators Still Dealing With Coronavirus Problems (June Statistics) on Jun 30, 2020
While numbers of integrators very impacted by Coronavirus continue to drop, most are still moderately dealing with the pandemic's problems, June...