Four "High" Dahua Vulnerabilities, "Not Responded", Says CISA; CISA Removes, Dahua Responds

Published Jul 15, 2022 12:16 PM

The US government's Cybersecurity & Infrastructure Security Agency, CISA, has disclosed four new "High" level vulnerabilities for the Dahua ASI7213X-T1 fever tablet / facial recognition access controller plus one "Medium" vulnerability.

IPVM Image

CISA said Dahua "has not responded to requests to work with CISA to mitigate" these serious vulnerabilities. Two weeks before CISA's announcement, Dahua disclosed separate "Medium" and "Low" vulnerabilities for the ASI7 series.

These vulnerabilities are different and add to the ones from this January - Dahua Broken Access Control Vulnerability and 10 months ago - Dahua New Critical Vulnerabilities 2021.

In this post, IPVM examines this incident and how it highlights Dahua's history of poor cybersecurity.

Update: Dahua responded to IPVM calling it a "miscommunication" and they are in "process of correcting the CISA advisory."

Update: CISA removed the section about Dahua not responding.

CISA ********* "****" ***** ***************

** **** **, ************** ******** *********** ****** ** ***** vulnerabilities **** "***** ***** ************ ******, upload ********* *****, *** ***** * denial-of-service *********" *** ******** ********-** ****** *********** **********:

IPVM Image

*** **** *************** ***** **** *.* to *.* **** (****** ************* ******* ******) ******, **** **** "****" *** one "******"*****:

IPVM Image

  • ***-****-****, **** ***** *.* (****), *** most ******* ** *** ****: * '**** *** ****' **** **** ****** ******* ** "access *** ****** ******* ******* * password".
  • ***-****-****, **** ***** *.* (****). *** product ***** ***** "**** ** ******* username ** *******" ***** "***** ***** an ******** ** **** ***** ******** values" *** **************-***** *******.
  • ***-****-****, **** ***** *.* (****). *** device ** "********** ** ********* ************** attempts, **** ** ******** ******** ** credential ******** *******".
  • ***-****-****, **** ***** *.* (****). * feature **** ****** ***** ** ****** potentially ********* ***** "**** ****** ** in *******".
  • ***-****-****, **** ***** *.* (******). ** input ********** **** ** *** ******'* web ****** "***** *** ***** * denial-of-service ********* ** *** ******."

**** **** **** "** ***** ****** exploits ************ ****** ***** ***************."

Based ** ****** ******** ********

**** **** *** *************** **** ******** by****** ********, * **********-***** *** ************* ****. In ******* ****, ****** **** ** had ************ ******** ********** *** ***** ********-** ********, ******** it *** *** ******* *** *************** publicly.IPVM Image

*** ************** *************, ********* *** *** ******* to *****, *** ********* "******** ** obscurity" ** "******** *********** ** ********** firmware, **** *** **** ** ******** any **** ** ******** ***** **** a **** ***** *** ***********".

Dahua ********* **** "******" & "***" ***************

** **** **, *** ***** ****** CISA's ************, ************** * ******** ********"** ******** ** *** ******** ****** reported ** ****** ********". *****'* ******** said ** *** ******** ***** ****** and *** ***-***** ***************:

  • ***-****-*****, **** ***** *.* (******). "**** an ******** **** * ***-**-***-****** ****** to ***** *** ******* ******* **** success ******* ** ******* *****, ** can *** ** ** *** ****** by ********* *** ****'* ***** ******."
  • ***-****-*****, **** ***** *.* (******). "**** an ******** **** * ***-**-***-****** ****** to ***** *** ******* ******* **** success ******* **, *** ******** ***** log ** ** *** ****** ** replaying *** ****'* ***** ******."
  • ***-****-*****, **** ***** *.* (******). "**** an ******** ********* *** ************** ******* and ********, ** ******* * ***-**-***-****** attack, *** ******** ***** **** * specified ******* ****** ** *** ********** interface **** **** *** ****** ** crash."
  • ***-****-*****, **** ***** *.* (***). "** the **** ******* *** ***** ******** on *** ******, ** ******** *** modify *** ****’* ******* **** ****** through * ***-**-***-****** ****** *** ******** to * ********* ****."

***** **** *** *************** ******** *** "ASI7XXXX" ****** *** **** *** ***-***** and ***-**** ****** ****** (***** **** unmentioned ** ****):

IPVM Image

***** ************ ******** *********/** ********** ********* ******* ** *******.

CISA: ***** "*** ********* ** ********" ** ******** ***************

****'* **************** ***** "*** *** ********* ** requests ** **** **** **** ** mitigate ***** ***************", ******** *** ******* *** *** *********** "** ************ ****" ** ** national ********:

IPVM Image

**** **** *** ***** **** *** companies *** ***** ************ ** ************* mitigation *******. **** ***** **** * handful **** *********:******(***),***** **********(***),***** ******(******),********(*****), *** *** *****.

**** ** *** ***** **** **** calls *** ***** *** *** **********, e.g. ********'* **** **** ****, ******* *** ***********.

Dahua's **** ************* ******

***** ********* *** *********** ************* ***************. For *******, ** ****** ***:

********, ** **** ******** ***** *** problems ********** ** *** ***************. *** example, **** *** **** ****, ***** ignored *** ***********' ****** ** ***** vulnerabilities:

IPVM Image

***:

IPVM Image

**** ** ******** ***** * ****, IPVM ******** ****** ** ******* ********* a ******** **** *****:

IPVM Image

Dahua ********

***** *** *** ******* ** ****'* request *** *******. ** ** **** Dahua ****, ** **** ****** *** report.

UPDATE: ***** ********

***** *** **** *** ********* ********, posted ***** ** ****:

** *** ******** **** **** ********* this ******* ******* ********* * ******** from ** *****. *** ******** *** sent ** ** *** **** ***** was ********** ************ *** ******. ** you **** **** ****, *** *** company ** ******* ********, ************* ********* on ********* ******** ******* ** **** coordinate **** *********** ****** ******** **** zones – *** **** ****** *** company, *** ** *********** ******** ****** that ** *** ******* ** *** schedule. * **-**** ******** ** *** middle ** *** ***** ** *** US *** ******** ** ***** ** impossible *** ** ** *** ********* situated ******** ** *********** *** ** believe **** ***** ****. ******, ** suspect **** **** ** *** ****** point **** ****’* ***********.

** * ****** ** **** ******** approach, **** *** ******* *********** *** readers. **** *** *** *****: **’** investigated *** *********** **** *** **** in **** ******** *******. ****** ****, an *********** ************* ************, ******** **** there *** * **************** ******* ***** analyst *** ***** *********** ** ****. They **** ************ ************* ** *****, and *** ******* ** **** ** in *** ******* ** ********** *** CISA ******** ** ******* *** **** that ***** ********* *** **** ** vulnerabilities **** ****** ******, *** *** issued ******* *** ***** ***************.

Comments (4)
JH
John Honovich
Jul 15, 2022
IPVM

***** *** *********:

** *** ******** **** **** ********* this ******* ******* ********* * ******** from ** *****. *** ******** *** sent ** ** *** **** ***** was ********** ************ *** ******. ** you **** **** ****, *** *** company ** ******* ********, ************* ********* on ********* ******** ******* ** **** coordinate **** *********** ****** ******** **** zones – *** **** ****** *** company, *** ** *********** ******** ****** that ** *** ******* ** *** schedule. * **-**** ******** ** *** middle ** *** ***** ** *** US *** ******** ** ***** ** impossible *** ** ** *** ********* situated ******** ** *********** *** ** believe **** ***** ****. ******, ** suspect **** **** ** *** ****** point **** ****’* ***********.

** * ****** ** **** ******** approach, **** *** ******* *********** *** readers. **** *** *** *****: **’** investigated *** *********** **** *** **** in **** ******** *******. ****** ****, an *********** ************* ************, ******** **** there *** * **************** ******* ***** analyst *** ***** *********** ** ****. They **** ************ ************* ** *****, and *** ******* ** **** ** in *** ******* ** ********** *** CISA ******** ** ******* *** **** that ***** ********* *** **** ** vulnerabilities **** ****** ******, *** *** issued ******* *** ***** ***************.

** ****** *** ** ****** **** article ***********.

** **** **** **** ** *** about **** *********** ******** – ***** is ****** ******** – ** *** coming ****.

********** ***** ********* ** **: ** gave **** ** ***** ** ** issue **** *** ** ********** ********* 2 **** ****** ****. ***** *** well ***** ** **** ***** *** what *** ** ********** ********* ******* in *** ****.

** ******* *** ***********@*********.***, ***** ** * **** ***** that ** *********** ** ******* ***** employees *** ***** ** ** ***** American ***** ***** ****.

** ****** ******* **** ***** ** angry ** ** ******* ** ***** own ********* ************* ****** *** ****** working **** *** ** **********.

(3)
bm
bashis mcw
Jul 16, 2022

*********** **** **Nozomi * **** ***, ********** ********* *** **** ******* ** ******* *** **. *****, *** ************* ******** ***** ** ** **'* **** ***** ***** ****, ***** **** ** "***********" ****** *** ** ***** ***** **** *** ***** *** ** ********** *** ******* **** ********/********** (****** *** ********** ***/** ********* ******* *** ** **** ** ******)

Nevertheless, **** *** *** **** ****** *** ******** *** ****** ******* *** ***********.

*********

"******** ** *********" ** "******** *********** or ********** ********, **** *** **** of ******** *** **** ** ******** other **** * **** ***** *** interaction".

* ******* *****, ******** ** ********** security, "****" *** (** *******) ********** time ********* ********* ** **** ***** the **** ******** *** *****.

******* ********, * **** **** ***** how **** ********* **********/********** *** *** generation ******* * **** ***** **** Dahua ********* *****, ***** ** ** that ******* **** ******** ** ***** are **** ** ********* *** **** use ** **********/*** **********.

(7)
UM
Undisclosed Manufacturer #1
Jul 18, 2022

** **** **** **** ** ** speak, *** **** ********** ******* ***** cyber ** ***** ******* ** ***** to ****.... ***

(1)
Avatar
Charles Rollet
Jul 20, 2022

******: **** *** ******* *** **** about *** ***** ***"*** ********* ** ******** ** **** with [**] ** ******** ***** ***************", see ****:***** ********-** (****** *).

*** ******* ********** ****:

IPVM Image

*** ** ***** ** ****** ******* to*****'* ******** ********:

IPVM Image:

**** *** ******* *** ** ***** & ****, ** **** ****** **** response.