Dahua Won't Say, But Anyone With Telnet Enabled Is At Risk

Author: Brian Karas, Published on Oct 05, 2016

Dahua has decided not to provide details they have about how hackers are exploiting their products. They explained:

A public statement about what technology is in place and which models have certain security features would serve as a beacon to hackers to attempt to infiltrate older-model Dahua products. We do not wish to put our customers at risk to such hackers.

Instead, Dahua's communication focuses on Dahua models running firmware releases prior to January 2015. Because of Dahua's fractured distribution / OEM model and historically poor firmware upgrade offering, many devices purchased after January 2015 are at risk.

In this note, we examine why telnet is critical to the Dahua hacks and what you should do about it.

***** *** ******* *** ** ******* ******* **** **** ***** how ******* *** ********** ***** ********. **** *********:

* ****** ********* ***** **** ********** ** ** ***** *** which ****** **** ******* ******** ******** ***** ***** ** * beacon ** ******* ** ******* ** ********** *****-***** ***** ********. We ** *** **** ** *** *** ********* ** **** to **** *******.

*******, *****'* ************* ******* ** ***** ****** ******* ******** ******** prior ** ******* ****. ******* ** *****'* ********* ************ / OEM ***** *** ************ **** ******** ******* ********, **** ******* purchased ***** ******* **** *** ** ****.

** **** ****, ** ******* *** ****** ** ******** ** the ***** ***** *** **** *** ****** ** ***** **.

[***************]

Three **** ******

*** **** **************** ** ****** ******* **** ***** *** **** ********* ****** to *** ******* *************.

** ******* ** ***** **** ******:

  • ****** ****** ** *** ******/********. ** ***** **** ******** ***** cameras *** ********* (*** ********** **** ** ***** ****) *** Telnet *********** ******* *** ***** ***** *** ****** ****.
  • ******* ********* *** *********.
  • ******************* ****** ** *** ****** **** **** ******* ********* **** downloaded ** *********.

**** *** ***** ******** ***** ****** ** *** ******, ** installs *** ******** ********* ****. ***** *** ******* *** ***** two ******, ***** ** ******** *****, *** **** ** ******* over *** ***** ********** *** **** ********* ****** ** ***** devices. ****, ****** ******* ***** *** *******, *** ***** *** users ** ***** ******** ****** ** ******** ***** ********** ***** devices *** ********.

Three ***** ** ******** **** ********

***** *** ***** ******* ****** ***** *** ** ** ****** their **** ** ********* ** **** (*** *****) *******:

  • ******* ********
  • ****** ******* *********
  • ****** ****** ** ********

Upgrade ********

**** ** *** **** ******** *********, ******* ****** ****** ***** has ** ****** ** ******* ** *** ******. ** **** the ***** ******** *** ******* ****** **********, ******* ***** ******** has ****** ******* *** ** ***** *** *** **** ** disable **.

***** *** ********* ******** ********* ** ************ ****, ***** ** ***** ********* **** **** ** ******* ******* Dahua ********* ** ***** ******. *** **** ** **** *** model ******, ***** ****** ** ******* ** *** ******, ** available ** *** *** ** ** **** ****** ** ***** to **** *** ****** ******** ********. *** ********* ********** ***** the ****** **** *** * ***** ******, ********* ***** *** "Information" ******* ** *** *** ** ** *** ******, *** can **** *** *** ******** ***** **** ***** ** ***** version **** ****** ** ********:

Change ******* *********

*** ***** ******* **** * ****-***** **** ** ********* *** passwords ** *** **** ********* *******. ***** *** ** ***** combinations, ********* ******* *****'* **** "*****/*****" *** "*****/********". ****** ********* are ***********, *** *********** ******** ***** **** * ****** ******* password ****** ******* ********* ** *** ******* *******.

Verify ****** ** ********

****** ****** ** ******** ***** ******** ** ******** ** * newer *******, *** ** ** **** ** ****** ** ** truly ********. *** *** ** ***** ***** ***** *** **** is ***** ****, ** * ******* **** ******, ***** ** **** ** *** ***** *****:

What ** ** ** *** *** *** ******* ********

***** ** ***** *** ********, ** ***** **** *** ****** to **** * ******** ****** *** ***** ****** ***** **** options ** ******* **********. ******** *** ******* ********* **** ******* attackers **** ******* ****** *** *****. ********* ****** (**** **) on ****** ****-********** ***** **** ******* *** ******* **** ********** to *** ****** ** *** ***** *****, ******** ****** **** if *** ********* *** **** ******* ********/******** ******.

Dahua ************* *****

***** *** ****** ******** **** ********* *****, ***** ********* ****** ****** *********** **** ******** *********, ***** strong *********, *** **** ********** ******** *****. ** **** *** specifically ******* ****** ** ********* ****** ******, ****** ** ******* users ** **** ******* ******** ***** ** **** ******* **** indirectly.

Comments (9)

*** ***** **** ***** ****** ** ****** ******. ***'* ****** in **** ***** ******* ** *** ******** ** *** ******** or ** **** ******* ********* **** *** *** ******?

****, ** *** ******** *********, ****'* ***** **** **** ***** known ********* *** ********* **** ******'* ** *******?

**** *** ****** ******** ** *** *** ******* **** ******'* be *******, *** **** ***** **** ** **** *******. ***** even ***** ****** *** *****?

** ***** *** ****** **** ** ***** ****** ******** **** a *********** ***** ****, **** ******* ****** *** ** ******** is ********.

*********, *** ****** ** ******** ***** ****** *** ********.

***, ***** ********, *** ***** ******* ***** ** ******** *** Telnet **** *****/*****, **** ** *** ******* *** ***** ******** to ********* ****. *** ******** ** *** ***** ******** **** restricted **** *** ******* ******. *** ***** ******** ***** ******* admin/admin ***********, ********* *****.

** **** ***** ** ***** **** *** **** **** *** here ** ** ****** *** ******** ******** ***** ** ******** through *** *** *** ****** ** ******* **.

** *** *** ***** ***** ***** *** ********, **** **** files **** ******* ****** **** ** ** *** ******. ********* hosts * ****** ** ******** ***** ********** *** ** *** need **** **** ******* ******** *******, ****** **** **** ** contact **. * *** ****** **** ***** *********** **** ***** number *** ******** **** ****** **** ********. **** **...** *** want *** ***** ***** *.* ******** **** * *** **** Dillabaugh...I ***** *** **** ** *** *** ******** ** ** released *** >.>

****'** ******* ** ********** **** *** **** *******. ** *** I ***** **'** **** ******** ************* *** ** ******* *** Smart *.***+!

**********, *'* **** ** ****!

***'* ****** ** **** ***** ******* ** *** ******** ** the ******** ** ** **** ******* ********* **** *** *** itself?

** **** *****, ***, ** ****** ** *******, *** ******* there *** ******** ** ********* ** ******* **** ** *** have ** *******.

*** ******* ****** *** ** **** ** ****** *** *** at ***, ** **** ** *** **** ** *** ***** source ****, *** **** **** ********* * ****** ** ******* to **** ************ ******** ***** **'*, *** ******* ***** ********:

****, ** *** ******** *********, ****'* ***** **** **** ***** known ********* *** ********* **** ******'* ** *******?

**** ***** ** **** *******. ** ***'*, ******** ******** *******, and ******** (*** ******** **** ****** *******) *** **** ** have ********* ********* ****.

* ***** **** ** ********** *** *** **** ***** *** product **** ~**** ******, *** ***** *** *****/***** ****-***** *** seemingly ************. ***** *** "********" ******** **** **** ******, *** so ***** ******** *** ****** ******** ** *******. * **** some ***** ********** ****** ******* ***** *** ****** ***** ******** changes **** *** *** ** ***** ********.

*** ** *** ***** ** **** ***** ** **** ********* for ***** ** **** ** **** *** ********. **** ** the ******* **** ** ******* ***** ******* ** * ***** camera *** ****. ***** ****** ****** *** ****** ******* ******** channels (***** ****) *** ** ** **** ****** **** **** people *** ****** ******* ***** *********.

*** *** *** ****** ***** *** ***********. * *** ** Security ***** *** *** ******** ******* ** ** ******* *** create ***************. **** ***** ******* ********* *** **** ***** ** firewalls **** *** *** ********.

* *** ** ******** ***** *** *** ******** ******* ** IP ******* *** ****** ***************.

*** ***** ***** ** ** ************* **** ** *** ************ closed ******? *** ** ** *** ** ** ****** ** something **** ** ******** ****** *** ** *** ***. ***/**?

******* ****** ****** ** ******** ***, *** **** ******* ** and **** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Suffering Criticism, Hikvision Keeps Insecure Online Service Up [Now Down] on Jan 03, 2017
Hikvision suffered severe criticisms for its abrupt plan to discontinue its Hikvision Online service, with 3 core functions to be removed on Dec...
Hikvision Discontinuing Online Service on Dec 12, 2016
Hikvision has declared it will discontinue its Hikvision online service, just days after IPVM's Hikvision Cloud Security Vulnerability...
Sony IP Camera Backdoor Uncovered on Dec 06, 2016
A backdoor has been uncovered in ~80 Sony IP camera models, attackers can remotely enable telnet on the camera, and then potentially login as root,...
XiongMai Master Password List Emailed By Chinese Spammer on Dec 05, 2016
XiongMai created an international uproar as their devices drove massive botnet attacks of major Internet sites. After pledging to recall cameras...
Hikvision Cloud Security Vulnerability Uncovered on Dec 05, 2016
A security researcher uncovered a critical vulnerability in Hikvision's global cloud servers. This vulnerability allowed an attacker to remotely...
Hikvision 'Phone Home' Raises Security Fears on Nov 10, 2016
The escalating attention towards Hikvision's China government ownership and Genetec's removal of Hikvision due to cyber security concerns has...
Genetec Expels Hikvision on Nov 08, 2016
Genetec has removed support for Hikvision devices, deeming them 'untrustworthy', citing customer concerns about Chinese government ownership /...
Now Knocking A Country Offline - The Video Surveillance Driven Botnet Wreaks Havok on Nov 03, 2016
The video surveillance driven botnet is now attacking an entire country. The Mirai malware that took advantage of poor security in Xiongmai, Dahua...
Dahua Says They Are Botnet Attack 'Victims' on Oct 26, 2016
'Victim' or 'accomplice'? Dahua has issued a new press release, referring to their products as 'victims' of the massive botnet attacks hitting the...
The Xiongmai Botnet 'Recall' Will Not Work on Oct 25, 2016
The Xiongmai 'recall' has been the topic of global news, following the unprecedented bot net attacks that use their equipment, among...

Most Recent Industry Reports

Jim Cramer Sucks Up To Knightscope on Jan 19, 2017
Credit must be given to Knightscope. They are raising money right now and despite their $80 million pre-money valuation against a lowly sub $1...
ADT Launches Canopy - Professional Monitoring For DIY Devices on Jan 19, 2017
The intrusion industry has criticized DIY security systems for years, claiming systems like Canary or Scout cannot match professionally installed...
Dahua (Un)Favorability Results on Jan 19, 2017
Dahua, the mega-Chinese surveillance manufacturer not primarily owned by the Chinese government has been trying to break out of the shadow of...
Paxton Hosted Access - Disruptive Low Dealer Pricing on Jan 19, 2017
Paxton is entering the hosted access game, with BLU, at a cost that is a fraction of key competitors. The different approach could be very...
Geovision Launches Direct Cloud Offering on Jan 18, 2017
Add cloud, subtract integrator. Geovision has launched myGVcloud, an offering that allows consumers to buy cameras and cloud services directly...
Anixter / Bosch Sells Direct to Amazon on Jan 18, 2017
Anixter regularly says they do not sell direct to end users or that they do not do it anymore. However, over the past year, Anixter has sold Bosch...
Smart Power Tools For Security Installs on Jan 18, 2017
Installing a smart camera? Perhaps you should use a 'smart' drill. The intelligent appliance / IoT trend has hit power tools. In this note, we...
Canon 250MP Prototype Targeted At Surveillance on Jan 17, 2017
At one point Axis declared the megapixel race was over, but now parent company Canon is showing an imager that would be a rocket ship in a...
Cut in Half, Everfocus Shifts Strategies on Jan 17, 2017
The race to the bottom impact continues. Now, Everfocus, who used to be one of the larger budget providers, is shifting strategies after years of...
Top ISC West 2017 Booth Moves on Jan 16, 2017
There are significant moves among many major manufacturers on the ISC West show floor, and very few prime spaces left unoccupied. In this report we...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact