Dahua Won't Say, But Anyone With Telnet Enabled Is At Risk

Author: Brian Karas, Published on Oct 05, 2016

Dahua has decided not to provide details they have about how hackers are exploiting their products. They explained:

A public statement about what technology is in place and which models have certain security features would serve as a beacon to hackers to attempt to infiltrate older-model Dahua products. We do not wish to put our customers at risk to such hackers.

Instead, Dahua's communication focuses on Dahua models running firmware releases prior to January 2015. Because of Dahua's fractured distribution / OEM model and historically poor firmware upgrade offering, many devices purchased after January 2015 are at risk.

In this note, we examine why telnet is critical to the Dahua hacks and what you should do about it.

***** *** ******* *** ** ******* ******* **** **** ***** how ******* *** ********** ***** ********. **** *********:

* ****** ********* ***** **** ********** ** ** ***** *** which ****** **** ******* ******** ******** ***** ***** ** * beacon ** ******* ** ******* ** ********** *****-***** ***** ********. We ** *** **** ** *** *** ********* ** **** to **** *******.

*******, *****'* ************* ******* ** ***** ****** ******* ******** ******** prior ** ******* ****. ******* ** *****'* ********* ************ / OEM ***** *** ************ **** ******** ******* ********, **** ******* purchased ***** ******* **** *** ** ****.

** **** ****, ** ******* *** ****** ** ******** ** the ***** ***** *** **** *** ****** ** ***** **.

[***************]

Three Core ******

*** **** **************** ** ****** ******* **** ***** *** **** ********* ****** to *** ******* *************.

** ******* ** ***** **** ******:

  • ****** ****** ** *** ******/********. ** ***** **** ******** ***** cameras *** ********* (*** ********** **** ** ***** ****) *** ****** permanently ******* *** ***** ***** *** ****** ****.
  • ******* ********* *** *********.
  • ********** ********* ****** ** *** ****** **** **** ******* ********* **** downloaded ** *********.

**** *** ***** ******** ***** ****** ** *** ******, ** installs *** ******** ********* ****. ***** *** ******* *** ***** two ******, ***** ** ******** *****, *** **** ** ******* over *** ***** ********** *** **** ********* ****** ** ***** devices. ****, ****** ******* ***** *** *******, *** ***** *** users ** ***** ******** ****** ** ******** ***** ********** ***** devices *** ********.

Three Steps ** ******** **** ********

***** *** ***** ******* ****** ***** *** ** ** ****** ***** risk ** ********* ** **** (*** *****) *******:

  • ******* ********
  • ****** ******* *********
  • ****** ****** ** ********

Upgrade ********

**** ** *** **** ******** *********, ******* ****** ****** ***** has ** ****** ** ******* ** *** ******. ** **** *** ***** firmware *** ******* ****** **********, ******* ***** ******** *** ****** ******* *** no ***** *** *** **** ** ******* **.

***** *** ********* ******** ********* ** ***** ******* ****, ***** ** ***** ********* **** **** ** ******* ******* Dahua ********* ** ***** ******. *** **** ** **** *** ***** number, ***** ****** ** ******* ** *** ******, ** ********* in *** *** ** ** **** ****** ** ***** ** find *** ****** ******** ********. *** ********* ********** ***** *** device **** *** * ***** ******, ********* ***** *** "***********" section ** *** *** ** ** *** ******, *** *** also *** *** ******** ***** **** ***** ** ***** ******* that ****** ** ********:

Change ******* *********

*** ***** ******* **** * ****-***** **** ** ********* *** passwords ** *** **** ********* *******. ***** *** ** ***** combinations, ********* ******* *****'* **** "*****/*****" *** "*****/********". ****** ********* are ***********, *** *********** ******** ***** **** * ****** ******* password ****** ******* ********* ** *** ******* *******.

Verify ****** ** ********

****** ****** ** ******** ***** ******** ** ******** ** * newer *******, *** ** ** **** ** ****** ** ** truly ********. *** *** ** ***** ***** ***** *** **** is ***** ****, ** * ******* **** ******, ***** ** **** ** *** ***** *****:

What ** ** ** *** *** *** ******* ********

***** ** ***** *** ********, ** ***** **** *** ****** to **** * ******** ****** *** ***** ****** ***** **** options ** ******* **********. ******** *** ******* ********* **** ******* attackers **** ******* ****** *** *****. ********* ****** (**** **) on ****** ****-********** ***** **** ******* *** ******* **** ********** to *** ****** ** *** ***** *****, ******** ****** **** if *** ********* *** **** ******* ********/******** ******.

Dahua ************* *****

***** *** ****** ******** **** ********* *****, ***** ********* ****** ****** *********** **** ******** *********, ***** strong *********, *** **** ********** ******** *****. ** **** *** specifically ******* ****** ** ********* ****** ******, ****** ** ******* users ** **** ******* ******** ***** ** **** ******* **** indirectly.

 

Comments (9)

*** ***** **** ***** ****** ** ****** ******. ***'* ****** in **** ***** ******* ** *** ******** ** *** ******** or ** **** ******* ********* **** *** *** ******?

****, ** *** ******** *********, ****'* ***** **** **** ***** known ********* *** ********* **** ******'* ** *******?

**** *** ****** ******** ** *** *** ******* **** ******'* be *******, *** **** ***** **** ** **** *******. ***** even ***** ****** *** *****?

** ***** *** ****** **** ** ***** ****** ******** **** a *********** ***** ****, **** ******* ****** *** ** ******** is ********.

*********, *** ****** ** ******** ***** ****** *** ********.

***, ***** ********, *** ***** ******* ***** ** ******** *** Telnet **** *****/*****, **** ** *** ******* *** ***** ******** to ********* ****. *** ******** ** *** ***** ******** **** restricted **** *** ******* ******. *** ***** ******** ***** ******* admin/admin ***********, ********* *****.

** **** ***** ** ***** **** *** **** **** *** here ** ** ****** *** ******** ******** ***** ** ******** through *** *** *** ****** ** ******* **.

** *** *** ***** ***** ***** *** ********, **** **** files **** ******* ****** **** ** ** *** ******. ********* hosts * ****** ** ******** ***** ********** *** ** *** need **** **** ******* ******** *******, ****** **** **** ** contact **. * *** ****** **** ***** *********** **** ***** number *** ******** **** ****** **** ********. **** **...** *** want *** ***** ***** *.* ******** **** * *** **** Dillabaugh...I ***** *** **** ** *** *** ******** ** ** released *** >.>

****'** ******* ** ********** **** *** **** *******. ** *** I ***** **'** **** ******** ************* *** ** ******* *** Smart *.***+!

**********, *'* **** ** ****!

***'* ****** ** **** ***** ******* ** *** ******** ** the ******** ** ** **** ******* ********* **** *** *** itself?

** **** *****, ***, ** ****** ** *******, *** ******* there *** ******** ** ********* ** ******* **** ** *** have ** *******.

*** ******* ****** *** ** **** ** ****** *** *** at ***, ** **** ** *** **** ** *** ***** source ****, *** **** **** ********* * ****** ** ******* to **** ************ ******** ***** **'*, *** ******* ***** ********:

****, ** *** ******** *********, ****'* ***** **** **** ***** known ********* *** ********* **** ******'* ** *******?

**** ***** ** **** *******. ** ***'*, ******** ******** *******, and ******** (*** ******** **** ****** *******) *** **** ** have ********* ********* ****.

* ***** **** ** ********** *** *** **** ***** *** product **** ~**** ******, *** ***** *** *****/***** ****-***** *** seemingly ************. ***** *** "********" ******** **** **** ******, *** so ***** ******** *** ****** ******** ** *******. * **** some ***** ********** ****** ******* ***** *** ****** ***** ******** changes **** *** *** ** ***** ********.

*** ** *** ***** ** **** ***** ** **** ********* for ***** ** **** ** **** *** ********. **** ** the ******* **** ** ******* ***** ******* ** * ***** camera *** ****. ***** ****** ****** *** ****** ******* ******** channels (***** ****) *** ** ** **** ****** **** **** people *** ****** ******* ***** *********.

*** *** *** ****** ***** *** ***********. * *** ** Security ***** *** *** ******** ******* ** ** ******* *** create ***************. **** ***** ******* ********* *** **** ***** ** firewalls **** *** *** ********.

* *** ** ******** ***** *** *** ******** ******* ** IP ******* *** ****** ***************.

*** ***** ***** ** ** ************* **** ** *** ************ closed ******? *** ** ** *** ** ** ****** ** something **** ** ******** ****** *** ** *** ***. ***/**?

******* ****** ****** ** ******** ***, *** **** ******* ** and **** ******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
Hikvision FIPS 140-2 Cybersecurity Certification Examined on Aug 27, 2018
A week after the US government passed a law banning Hikvision, Hikvision announced it had obtained a FIPS 140-2 certification from the US...
Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...
July 2018 IP Networking Course on Jul 12, 2018
Registration is closed. This is the only networking course designed specifically for video surveillance professionals.  Lots of network training...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring (now US government banned) Dahua as a...
Debating Relevance of China Hacking US Navy Plans on Jun 11, 2018
"Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to...
Remove Dahua and Hikvision Gov Installs Required By US House Bill Ban on Jun 06, 2018
The final released US House Bill HR 5515 verifies that it not only prohibits the purchasing of Dahua and Hikvision products, it requires removing...
Dahua's Terrible Cybersecurity, Buys Credibility From PSA And SIA on Jun 04, 2018
Dahua has a terrible cybersecurity track record. But American organizations, like the Security Industry Association (SIA) and the PSA Security...
Canon Responds To IP Camera Hacks on May 30, 2018
Canon cameras made international news earlier this month, with reports of them being hacked in Japan (e.g., Hackers disable scores of Canon-made...

Most Recent Industry Reports

Ladders For Installers Guide on Sep 25, 2018
Ladders are one of the most important pieces of worksite equipment for the surveillance technician. Too often, however, even highly experienced...
Favorite Access Control Reader Manufacturer 2018 on Sep 25, 2018
Favorite reader votes are in, and it is not close. A global access giant ran away with the votes in a one-sided contest. But for many, the...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
4MP Camera Shootout - Axis, Dahua, DW, Hanwha, Hikvision, Uniview, Vivotek on Sep 24, 2018
4MP usage continues to climb, especially for low cost fixed lens models. To see who was best, we bought and tested seven 4MP models from Axis,...
Alexa Guard Expands Amazon's Security Offerings, Boosts ADT's Stock on Sep 21, 2018
Amazon is expanding their security offerings yet again, this time with Alexa Guard that delivers security audio analytics and a virtual "Fake...
UTC, Owner of Lenel, Acquires S2 on Sep 20, 2018
UTC now owns two of the biggest access control providers, one of integrator's most hated access control platforms, Lenel, and one of their...
BluePoint Aims To Bring Life-Safety Mind-Set To Police Pull Stations on Sep 20, 2018
Fire alarm pull stations are commonplace but police ones are not. A self-funded startup, BluePoint Alert Solutions is aiming to make police pull...
SIA Plays Dumb On OEMs And Hikua Ban on Sep 20, 2018
OEMs widely pretend to be 'manufacturers', deceiving their customers and putting them at risk for cybersecurity attacks and, soon, violation of US...
Axis Vs. Hikvision IR PTZ Shootout on Sep 20, 2018
Hikvision has their high-end dual-sensor DarkfighterX. Axis has their high-end concealed IR Q6125-LE. Which is better? We bought both and tested...
Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact