Dahua Won't Say, But Anyone With Telnet Enabled Is At Risk

Author: Brian Karas, Published on Oct 05, 2016

Dahua has decided not to provide details they have about how hackers are exploiting their products. They explained:

A public statement about what technology is in place and which models have certain security features would serve as a beacon to hackers to attempt to infiltrate older-model Dahua products. We do not wish to put our customers at risk to such hackers.

Instead, Dahua's communication focuses on Dahua models running firmware releases prior to January 2015. Because of Dahua's fractured distribution / OEM model and historically poor firmware upgrade offering, many devices purchased after January 2015 are at risk.

In this note, we examine why telnet is critical to the Dahua hacks and what you should do about it.

***** *** ******* *** ** ******* ******* **** **** ***** how ******* *** ********** ***** ********. **** *********:

* ****** ********* ***** **** ********** ** ** ***** *** which ****** **** ******* ******** ******** ***** ***** ** * beacon ** ******* ** ******* ** ********** *****-***** ***** ********. We ** *** **** ** *** *** ********* ** **** to **** *******.

*******, *****'* ************* ******* ** ***** ****** ******* ******** ******** prior ** ******* ****. ******* ** *****'* ********* ************ / OEM ***** *** ************ **** ******** ******* ********, **** ******* purchased ***** ******* **** *** ** ****.

** **** ****, ** ******* *** ****** ** ******** ** the ***** ***** *** **** *** ****** ** ***** **.

[***************]

Three Core ******

*** **** **************** ** ****** ******* **** ***** *** **** ********* ****** to *** ******* *************.

** ******* ** ***** **** ******:

  • ****** ****** ** *** ******/********. ** ***** **** ******** ***** cameras *** ********* (*** ********** **** ** ***** ****) *** ****** permanently ******* *** ***** ***** *** ****** ****.
  • ******* ********* *** *********.
  • ********** ********* ****** ** *** ****** **** **** ******* ********* **** downloaded ** *********.

**** *** ***** ******** ***** ****** ** *** ******, ** installs *** ******** ********* ****. ***** *** ******* *** ***** two ******, ***** ** ******** *****, *** **** ** ******* over *** ***** ********** *** **** ********* ****** ** ***** devices. ****, ****** ******* ***** *** *******, *** ***** *** users ** ***** ******** ****** ** ******** ***** ********** ***** devices *** ********.

Three Steps ** ******** **** ********

***** *** ***** ******* ****** ***** *** ** ** ****** ***** risk ** ********* ** **** (*** *****) *******:

  • ******* ********
  • ****** ******* *********
  • ****** ****** ** ********

Upgrade ********

**** ** *** **** ******** *********, ******* ****** ****** ***** has ** ****** ** ******* ** *** ******. ** **** *** ***** firmware *** ******* ****** **********, ******* ***** ******** *** ****** ******* *** no ***** *** *** **** ** ******* **.

***** *** ********* ******** ********* ** ***** ******* ****, ***** ** ***** ********* **** **** ** ******* ******* Dahua ********* ** ***** ******. *** **** ** **** *** ***** number, ***** ****** ** ******* ** *** ******, ** ********* in *** *** ** ** **** ****** ** ***** ** find *** ****** ******** ********. *** ********* ********** ***** *** device **** *** * ***** ******, ********* ***** *** "***********" section ** *** *** ** ** *** ******, *** *** also *** *** ******** ***** **** ***** ** ***** ******* that ****** ** ********:

Change ******* *********

*** ***** ******* **** * ****-***** **** ** ********* *** passwords ** *** **** ********* *******. ***** *** ** ***** combinations, ********* ******* *****'* **** "*****/*****" *** "*****/********". ****** ********* are ***********, *** *********** ******** ***** **** * ****** ******* password ****** ******* ********* ** *** ******* *******.

Verify ****** ** ********

****** ****** ** ******** ***** ******** ** ******** ** * newer *******, *** ** ** **** ** ****** ** ** truly ********. *** *** ** ***** ***** ***** *** **** is ***** ****, ** * ******* **** ******, ***** ** **** ** *** ***** *****:

What ** ** ** *** *** *** ******* ********

***** ** ***** *** ********, ** ***** **** *** ****** to **** * ******** ****** *** ***** ****** ***** **** options ** ******* **********. ******** *** ******* ********* **** ******* attackers **** ******* ****** *** *****. ********* ****** (**** **) on ****** ****-********** ***** **** ******* *** ******* **** ********** to *** ****** ** *** ***** *****, ******** ****** **** if *** ********* *** **** ******* ********/******** ******.

Dahua ************* *****

***** *** ****** ******** **** ********* *****, ***** ********* ****** ****** *********** **** ******** *********, ***** strong *********, *** **** ********** ******** *****. ** **** *** specifically ******* ****** ** ********* ****** ******, ****** ** ******* users ** **** ******* ******** ***** ** **** ******* **** indirectly.

 

Comments (9)

*** ***** **** ***** ****** ** ****** ******. ***'* ****** in **** ***** ******* ** *** ******** ** *** ******** or ** **** ******* ********* **** *** *** ******?

****, ** *** ******** *********, ****'* ***** **** **** ***** known ********* *** ********* **** ******'* ** *******?

**** *** ****** ******** ** *** *** ******* **** ******'* be *******, *** **** ***** **** ** **** *******. ***** even ***** ****** *** *****?

** ***** *** ****** **** ** ***** ****** ******** **** a *********** ***** ****, **** ******* ****** *** ** ******** is ********.

*********, *** ****** ** ******** ***** ****** *** ********.

***, ***** ********, *** ***** ******* ***** ** ******** *** Telnet **** *****/*****, **** ** *** ******* *** ***** ******** to ********* ****. *** ******** ** *** ***** ******** **** restricted **** *** ******* ******. *** ***** ******** ***** ******* admin/admin ***********, ********* *****.

** **** ***** ** ***** **** *** **** **** *** here ** ** ****** *** ******** ******** ***** ** ******** through *** *** *** ****** ** ******* **.

** *** *** ***** ***** ***** *** ********, **** **** files **** ******* ****** **** ** ** *** ******. ********* hosts * ****** ** ******** ***** ********** *** ** *** need **** **** ******* ******** *******, ****** **** **** ** contact **. * *** ****** **** ***** *********** **** ***** number *** ******** **** ****** **** ********. **** **...** *** want *** ***** ***** *.* ******** **** * *** **** Dillabaugh...I ***** *** **** ** *** *** ******** ** ** released *** >.>

****'** ******* ** ********** **** *** **** *******. ** *** I ***** **'** **** ******** ************* *** ** ******* *** Smart *.***+!

**********, *'* **** ** ****!

***'* ****** ** **** ***** ******* ** *** ******** ** the ******** ** ** **** ******* ********* **** *** *** itself?

** **** *****, ***, ** ****** ** *******, *** ******* there *** ******** ** ********* ** ******* **** ** *** have ** *******.

*** ******* ****** *** ** **** ** ****** *** *** at ***, ** **** ** *** **** ** *** ***** source ****, *** **** **** ********* * ****** ** ******* to **** ************ ******** ***** **'*, *** ******* ***** ********:

****, ** *** ******** *********, ****'* ***** **** **** ***** known ********* *** ********* **** ******'* ** *******?

**** ***** ** **** *******. ** ***'*, ******** ******** *******, and ******** (*** ******** **** ****** *******) *** **** ** have ********* ********* ****.

* ***** **** ** ********** *** *** **** ***** *** product **** ~**** ******, *** ***** *** *****/***** ****-***** *** seemingly ************. ***** *** "********" ******** **** **** ******, *** so ***** ******** *** ****** ******** ** *******. * **** some ***** ********** ****** ******* ***** *** ****** ***** ******** changes **** *** *** ** ***** ********.

*** ** *** ***** ** **** ***** ** **** ********* for ***** ** **** ** **** *** ********. **** ** the ******* **** ** ******* ***** ******* ** * ***** camera *** ****. ***** ****** ****** *** ****** ******* ******** channels (***** ****) *** ** ** **** ****** **** **** people *** ****** ******* ***** *********.

*** *** *** ****** ***** *** ***********. * *** ** Security ***** *** *** ******** ******* ** ** ******* *** create ***************. **** ***** ******* ********* *** **** ***** ** firewalls **** *** *** ********.

* *** ** ******** ***** *** *** ******** ******* ** IP ******* *** ****** ***************.

*** ***** ***** ** ** ************* **** ** *** ************ closed ******? *** ** ** *** ** ** ****** ** something **** ** ******** ****** *** ** *** ***. ***/**?

******* ****** ****** ** ******** ***, *** **** ******* ** and **** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

No Hack, Still Liable, Court Finds ADT on Jun 20, 2017
Recently, ADT has been in the news for a $16 million settlement for a cyber security vulnerability class action suit. One of the most important...
How To Hack Your Company's Hikvision Recorder on May 29, 2017
Here's how easy it is to hack your company's Hikvision recorder: It does not matter how hard or secret the admin password is. Hikvision will...
Anti-Hack Access Card Shields Tested on May 26, 2017
Keeping your access control card information secure is becoming a big priority, especially since cheaper copiers can hack details easily. Multiple...
Axis Criticizes OEMs: "When You Buy An Axis Camera, An Axis Camera Is What You Get!" on May 19, 2017
When you buy a Honeywell camera, you likely get a Hikvision, Dahua or some other company's product. The same goes for easily 100 different...
Hackable 125kHz Access Control Migration Guide on May 19, 2017
Despite being one of the most popular credentials, 125 kHz credentials are easily copied and insecure as we showed in our test results, video...
Cisco: Hikvision Hired Us on May 16, 2017
The day after Hikvision's backdoor was confirmed by the US Department of Homeland Security, Hikvision issued a press release about a...
Hikvision Blaming Backdoor On Others, Cannot Hide From DHS on May 11, 2017
Numerous Hikvision employees are blaming their backdoor on others but Hikvision cannot hide from the US Department of Homeland Security. Blaming...
Hikvision Backdoor Confirmed on May 08, 2017
The US Department of Homeland Security's Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) has issued an advisory for...
Hack Your Access Control With This $30 HID 125kHz Card Copier on May 01, 2017
You might have heard the stories or seen the YouTube videos of random people hacking electronic access control systems. The tools that claim to do...
Last Day - IP Networking Course May 2017 on Apr 26, 2017
Today is the last day to register for the May IP Networking Course. This is the only networking course designed specifically for video...

Most Recent Industry Reports

Avigilon Announces RADAR-Based Presence Detector on Jun 22, 2017
RADAR is gaining momentum within physical security. Two months after Axis announced a network radar detector, Avigilon has announced a RADAR-Based...
Covert Cloud Camera Service Launching (KJB) on Jun 22, 2017
Cloud IP cameras, for consumers, has become increasingly commonplace. However, covert cameras, lag there, with few options. Now, North America's...
Manufacturers Shipping Unlicensed H.265 Products on Jun 22, 2017
While H.265 support in video surveillance is growing, IPVM's research shows that most surveillance manufacturers are shipping H.265 products with...
Uniview Low-Cost Bullet PTZ Tested on Jun 21, 2017
Uniview is offering a HD zoom bullet camera, the IPC742SR9-PZ30-32G, with an integrated pan / tilt positioner, for the price of a low-cost...
QSR Video Surveillance Best Practices on Jun 21, 2017
Fast food restaurants or QSRs (quick service restaurants), are frequent victims of crime and fraud. Because they are open late, deal with cash, and...
45 Drives 'Lowest Cost' Enterprise Storage Company Profile on Jun 21, 2017
45 Drives claims the "lowest cost per Hard Drive Slot in the industry." But who or what is '45 Drives'? What started as a product design to...
No Hack, Still Liable, Court Finds ADT on Jun 20, 2017
Recently, ADT has been in the news for a $16 million settlement for a cyber security vulnerability class action suit. One of the most important...
Resolver / PPM 2000 Incident Management Platform Profile on Jun 20, 2017
You might have seen the company whose employees wear hockey jerseys at trade shows and wondered "what do they do?" PPM 2000 has been active in...
Axis P3225 Mk II Tested Vs. Original on Jun 20, 2017
Axis has released a number of 'Mk II' versions of their cameras, which are the same fundamental camera but with specific improvements. We tested...
Directory of 40 IP Camera Manufacturer Discovery Tools on Jun 19, 2017
Locating the IP address of a DHCP client or factory defaulted device on a network is often a difficult task.  In another report, we discussed...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact