Dahua Suffers Second Major Vulnerability, Silent [Finally Acknowledges]

Author: Brian Karas, Published on Jul 25, 2017

Less than 3 months ago, Dahua received DHS ICS-CERT's worst score of 10.0 for their backdoor.

Now, Dahua has received another 10.0 score for a new vulnerability. Despite that, Dahua has remained silent.

In this note, we examine the vulnerability, Dahua's poor handling of this, compared to competitors Axis and Hikvision, and the potential impact to Dahua.

[Update: After the publication of our report, Dahua has finally acknowledged the vulnerability]

**** **** * ****** ***,***** ******** *** ***-****'* ***** ***** ** **.**** ***** ********.

***, ***** *** ******** ******* **.* ***** *** * *** vulnerability. ******* ****, ***** *** ******** ******.

** **** ****, ** ******* *** *************, *****'* **** ******** of ****, ******** ** *********** **** *** *********, *** *** potential ****** ** *****.

[******: ***** *** *********** ** *** ******, ***** *** ******* acknowledged *** *************]

[***************]

Vulnerability ********

*****'* *** ********* ** ********** ** ***** ****** ********, ********* ** ****, ********* ** *** ** ***. ************, the ***** ***** *** *** ***** ********, ** *** **** first **** *** *** **** ********** ** *** ******, **** not ******** ***** **** ******. **** *** ** **** ** an ******** ** ****** *********** **** **** ** *** ******** field, *** ******* * ****** ******** ** *** ****** **** that ********* *** *****.

****** ********* *** ** ********* ** ***** ** ******** ** disable *** ******, **** **** ******, ** ********* ********** *** unit. ******* **** ************* ****** ** *** ***** **** ******, no ************** ** ******** ** ******* **, *** *** ****** with ****** ****** ** ** **** ** *******.

*** ****** **** **** ***** *** ******** ****** * ****** ago, ** *** *** ** ***.

Models ********

***** ***** ** ****** **** *** ******** *** **** ***** has ******** * ******** ***, *********:

*******, ** ** *** ***** *** **** ***** ****** *** impacted. *** *******,***** **** **********, **** ****** *****, ** ******* *******, **** ***** *******, part ******* *** ******* *** *** **** *********** ********. ********, as *** ***** **** *** ***** ********, ***** ***** ****** code ****** ******* *****, **** ***** ****** ***** ** ********.

No ********** / ** ******

***** *** **** ** ******** ********** *** ****** ** **** disclosure, ***** ** ******** ** ***** ******* ** ** ******* below *** *****'* ***********.

**** *** ******* *** ** ******** ******** ** ***** *** has ******** ** **-***-****** ******** ***** **** ****** *************

Fix **********

*** *** **** ************* ****** ******** * **** ** ******** on *****'* ************* **** **** ***** *** *** *************. *** that ****, *** **** ** *****'* ************* ***** *** ****, returning *** ******:

******: ***** ** *****, *** **** / ***** *** *** active.******** ******** ** *** *** ************* ****.

*****'* ***** ******* ******* ** **********, *** *** ** ********* to **** *************, *** **** ************* ****** ***** **** ***** 2017:

**** *** ******** ************* ******* **** **********, ** ** **** listed ** ****** ******* ***** ***** *** **** ****** ********.

Researcher **********

*** **** ******* *********** *****, ** ***** ******** ************ ************, *** **** ******** (** ****/*********** *****) **** *** ********* of *** *************. ******** ************ ******* ** ******* ********** ******* of *** *************.

Violates ******** *********

*** **********, **** ** *** **** *** ********* **** ******* vulnerabilities:

*********'* ******* ************** ***** ********** ***** **** ****** *************, *** ***** ** firmware *******:

**** ******** ******* ** ***** ***************, *** ***** ** ********, on ************ ************:

**** ** ***** ******** ** *****'* **** ** ***************, **** of ********, *** ** *** **** ** **** ***********, **** of **** ********** ********.

******

*** ******* ** **** ***** ********* ** **** ** ********* poor ***** ******, **** **** ******* *************** *** **** ******* to ******** ****** *** ****** ***** *********. ** **** ***, we ** *** *** **** ********* ***** **** *****, ** some *****, **** ** ******** ** ***** *** *****. *******, it **** **** *** ********* ** ********* ***** ** ** acknowledge *************** **********, *** ******* ******** **** ********* *** *****.

Vote / ****

******

****** **** ****:***** *** *** ****** * ***** ********* *** ******* ************* *** *************, ****** ** **** ******* 4 ** ***** ****** *** **** * ******** ******* ** not *** *********:

***** *** ******** ** ***** **** *** **** *** ****, this *** *** **** ** ***** ******* ***** *** ****. The ************* *** ****** ******** ** **** **** **** *** the **** ****** **** ***** *** ******** ** *** **.

***** ** ***** ** ******** ** ****** ** *** ***** International ******* ***** ******* ** ***** ******** *******.

Comments (34)

***** ** *** **** ******* **** *** ******** ****** ** the ****** **** ***** ** **.

**** ** * ******* **** ****** ~$* ******* ** ****** revenue, **,*** ** ** ********* *** ********** ***** ** ** even *** ****** *****.

***** ****** **** *** ******* ****** ******* ***** ** ******* they ****** **** *** *********** ********** ** ******* ******* **.

* ***** *** ******* ******* ** **** *** *** ******** poor ** ** *** ********** ******** ********.

* ***** *** **** ***** ** ** - **** ** you ***** ** ***** ******** *** ********?

******: "**** ** *** ***** **the ******* ** Dahua security and response?".

***'* **** ** ***** *** ****** ***** ** ** *************** found ** ** ******* *** ** *******. **** ** *** nature ** * ******** ***** ******* *** *** *** **** people *** ***** **** ** **** ***** *** ***** *********** harm. ******* *** *************** *** ********** ** *** ************ ** a ***** *** ****** *** **** ** **** ********** ** safe ** ********. *** **** ******** *** *** ********* ** a ************, *** * ***'* **** ***** *** ******, ** how **** ****** *** ********* *** *** **** **** ****** the *********. ************* **** ** **** ***** *** ***** **** their ** ** ***** *** ******* *** ********** **** **** of *** *****. ** ** **** ** **** ********* ******** want-to-be ********* *** ****** ***** *********, ** ******* ** ******** IP ****** ************. * ***** ********* *** ****** **** ** these ********* ***'* **** ** ******* ******* *** *********** ** due ** *** **** **** ****'* ******** *** ************* ********** and ***'* **** ***** **** ****'* ** **** ******** ******* and **** **** *** **** ***** **** *** ***************. ***'* face ** *** **** ******** *********, ** ** *** *** own **** ******* **** ***** *** *** *** ***.

*******, * ***** **** *** ***** *** ********** ** ********** "******* *** **********".

*******, * **** ***** **** *************** ****** ** ********* ***** on *** *********** *** **** **** *** ** *******. **** Dahua, **** ** * *** **** ** *** *****. ***** recent *************** **** ** ** ***** ****** **** ******* ****** skill ** *******. **** ***** **** **** ********* ** **** as ****** ** **** *********** ******** **** *****'* ******** **** vulnerabilities **** *** ******* ** ******* ** **** ********* **.

****** ***** *** ** *********** *********. * ********* ** ***** about *** ******** ******** *** *** **** * ***** ** to *** ** ** **** ***** ******** * *** *** I *** ********** ******* ** *** * *** ******** ** do **. ** ***** *** ****** ***** ****** ** ***'* something **** ***** ** ****** ***** ********* ** ** **** average ******** ****.

* ********* ** ***** ***** *** ******** ******** *** *** what * ***** ** ** *** ** ** **** ***** products * *** *** * *** ********** ******* ** *** I *** ******** ** ** **.

*****,**** ** *** ****** ** *** / ******* *** ***** backdoor. **'* ****** ** ****** *** **'* ***** ******** ******* to ***. **'* *** **** *** ** **** ** *********** on ******** ******** ****.

** ***'* ********* **** ***** ** ****** ***** ********* ** by **** ******* ******** ****

*** ******* *********, ** **** ****** ******, ***** ***** *** clearly ******** *********, ***** ****** **** ********* ** **.

***** ********. ******** ************** ** ***** ** * **** ***** mistake ** **** :(

***

** **** ******** **** * **** **** ******* ** **** this ** ******* ** ***** **** *** ****** ***** *******, when ** ***** **** *** ***** ** ***** ** *** last **** *** * ****.

**** ** *****'* ****** ************* **** * **.* **** *****, and **** *** ****** *** **** ****. *** ******** ***, the***** *********** *********** **** ********, ** ** *** ********** **** ** exploit, ******** * ***** ****** ** *******, *** **** ******** sensitive **** (*********).

**** ******* ******** ********** ***** ***************, ***** ** **** ****** ** *********** ******* *********** ****.

...*** ***** ***** *** *** ***** ********, ** *** **** first **** *** *** **** ********** ** *** ******, **** not ******** ***** **** ******...

**** ** *****'* ****** ************* **** * **.* **** *****, and **** *** ****** *** **** ****. *** ******** ***, the ***** ********...

**** **** *** **** ** *** ***** *********...

*****'* ****** ************* ****, ********* *** ******** *** ****, *** been **** ** ***** * ***** ***.

*** *** **** ***** *** ****** ** ** *** ******* it *** **** ************* ** ****** **** **** ** ****** find / ****** *** *****.

********** **** **** *** ** *** ** ** **** ** comprehend *** * ******** ****** ********** ******* ***** **** **** issues.

******: ***** (** *****) ** *****, *** **** / ***** are *** ******.******** ******** ** *** *** ************* ****.

****** ** ******* ****** *** ****** ******** ;)

******. **'** ***** ******* ****** *** *** ********. *** ******!

**** ********** - *'* *** ******** * ****** ********...

** ***** ********** *** ********* ** ********, ** **** ** Sonia ******* **** *** ** **** ******** ** **** ******** chipset ******. *'** *** **** **** * *** *** ** in ** *** ****.

****, ** **** ** ***** ******* ** *** ******** *******, this ** *** ****** *** *** ********* (***** ** ******* in * ********* ********** ** *** ********)...

*** **** *********** **** ********** *** ******** ******?

***** ** *** ** *** *********, **** *** **** **** I've ****. *** * ************ ***** **** ** **'* *** the **** ******* ****** *** ** ****.

****, **** ******** ******* **** ******* ** ******** ****...***** *'** sold **** *-* ** ** * ***** ****? *****'* **** like **'** ****** *** **** ******** *******...** ***

**** *** ******* ** **** ******* ********* *** *****, * would *** ** ********* ** *** **** ***** ** ****. I ***** *** **** *** ** **** *** ** **** is *** ****, ** ** *** **** ******* *** ** exploit *** ** *****, ** **** ** *** ** ********* FW ******* *** *** ** ****** **** *****. ******** **** that *** *********** **** ******* **** ******** ************* **** ** the ****** **** ***** ******.

**** *** ******* ** **** ******* ********* *** *****

#*, ******. *** *** ********* ** **** '*********' *** '*****' are *** *** **** ****** / ******?

**,

********* *** ***** ** *** *** **** ******** **** *****'* devices, ***** *** ********** ** **** (**** ** ****) *** naming ** *** ******** ******, ********* **** "*******" **** **** been ******* *** ******** ***.

**** **** ****** ** ****** *** ******, ****/***** ******, *****, RTSP, ***** *******... ***, ** ***** - **'* *** *** binary **** ****** ****** ********** ********* ********** ******** *** ********.

*** *********** ***** **, **** **** *** ***** **** ****** code *** *** ******** *** ********* "*******" ** ************ (***/****... or ********), *************** ***** ** *** ************/******* *** **** ****** to ***** ** *** ****** ** **** (*'**).

**** ** *** **** **** ******** ********, ** ********* * ***** *** ** ********* **** **** flaw ***** ** **** ********* *** *****, *** ** ************ exploited *** **** ****** **** (** *** *********/***** ******** **** as ****).

*******, ***** ***** ** * ********** ** *** **** **** for ******** - ***** *** **** **** *****, *** ***** exist ***** ********* *) ******, *) ***** ***** **** *** 3) ***, *** ** ***** ****** **** ***** ** ******** who ******* "***", *** **** ***** ****** **** *** ********** devices.

******, **** ***** **** * *** ** **** *** "*****" binary.

~ # ** ** | **** *****
*** **** ***:** /***/***/***** ****
*** **** *:** **** *****
~ #

~ # ******* -*** | **** *****
*** * * *.*.*.*:***** *.*.*.*:* ****** ***/*****
*** * * ***.*.*.*:**** *.*.*.*:* ****** ***/*****
*** * * ***.*.*.*:**** *.*.*.*:* ****** ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ****** ***/*****
*** * * :::*** :::* ****** ***/*****
*** * * :::** :::* ****** ***/*****
*** * * :::***** :::* ****** ***/*****
*** * * :::***** :::* ****** ***/*****
*** * * :::*** :::* ****** ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * ***.***.***.***:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * ***.***.*.**:***** *.*.*.*:* ***/*****
*** * * ***.***.***.***:***** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * ***.***.*.**:**** *.*.*.*:* ***/*****
*** * * ***.***.***.***:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ***/*****
*** * * ***.***.***.***:***** *.*.*.*:* ***/*****
**** * [ ] ***** *** ***/***** /***/***/**************-******
**** * [ ] ***** ***** ***/***** /***/***/************-*

******! **** *******.

***, ******** *******, ** *** ******** ****************:

***** (*** *****) *** ***** (*** ******/********) ** **** *** name ** * ****** **** **** ******** **** *** *** and *** ***/*********** ********* ** *** ***/***/***.

**** **** **** *********** ** *****. ** *** ***** ***** is * ***** ***** ** ******* *** ********? *** *** sense ** **** *** ******* **** **?

**** ***********, ***** **** **** ** ** **** *********, ***** and ***** ***** **** ****.

*** *** ** *** ******** ***** ** "*** ********" ********* Hikvision, *** - **** **** ** **** *** ****** **** provides **** ******** (***** *******), *** ** ******** ** **** Dahua *********/***** *** ********* *******, * **** *** ***** **** davinci ***** **** **** ** *********/***** - *** ****** *** quite **** ** ***** **** ********* **** **** ***, ** maybe **** **** ** *** **** ******* **** *** (*********** now, ** * **** *** ***** ** *** *** *** binary *** ******** *** ******** ******* - *** **** ***).

*** **** ** ****** **** * ********* ***.

# # ******* -***
****** ******** *********** (******* *** ***********)
***** ****-* ****-* ***** ******* ******* ******* ***** ***/******* ****
*** * * *.*.*.*:** *.*.*.*:* ****** ***/********
*** * * ***.*.*.*:***** *.*.*.*:* ****** ****/********
*** * *** ***.***.*.**:** ***.***.*.***:***** *********** ****/********
*** * * :::**** :::* ****** ***/*******
*** * * :::*** :::* ****** ***/*******
*** * * :::** :::* ****** ***/*******
*** * * :::** :::* ****** ***/********
*** * * ::*:***** :::* ****** ****/********
*** * * :::*** :::* ****** ***/*******
*** * * *.*.*.*:***** *.*.*.*:* ***/*******
*** * * *.*.*.*:**** *.*.*.*:* ***/*******
*** * * *.*.*.*:***** *.*.*.*:* ***/*******
*** * * *.*.*.*:**** *.*.*.*:* ***/*******
*** * * *.*.*.*:**** *.*.*.*:* ***/*******
*** * * :::*** :::* ***/*******
*** * * :::**** :::* ***/*******
*** * * :::***** :::* ***/*******
*** * * :::**** :::* ***/*******
*** * * :::***** :::* ***/*******
*** ***** * :::** :::* ** ***/*******

** * ****** **** *** **** *** **** **** ********* or **** **** ** ** **** **** **** *************. *****?

****, **** **** ******* ******* *****? *** ****.

** * ****** **** *** **** *** **** **** ********* or **** **** ** ** **** **** **** *************. *****?

***, ** ***** ** ** ****** ****** ** *** *** interface ** *** **** **** *** ****** ** **** **** this ************* ***** ******** ********.

****, **** **** ******* ******* *****? *** ****.

**** **** ****** ******* **** **** * ***** ************* ** your ******* *** ***** ** ** *****. ** ** ******** gains ****** **** ******* ******, **** **** *** *** **** vulnerability ** **** ****** ** *** *****, **** *******, ***.

***, ** ***'* ** ******** ** **** ******* *** ******** remotely **********, *** *** *******'* **** ****** **.

**'* *** ******** ** *** ** **** ******** ******. *** when *** *** ** *** ****** *** *********** *** ***'* give * **** ******* ** **** *********... **** **** ** just ***** *************. **** **** ***** *** ******, **** **** has ***** **** **** *** *********. ***** ***, **** ****, this *** ***** ****** ** ***** ************* ** * ***** period ** ****.

**** ******* * ***, **** ******* ***** *** ******* ***** help ********* **** ***** ******* **** ******, ** ***** ****** them * ******.

******* * ***** *** ** ********* ********** *****'* **** ** go ****.

*** *********.

******:***** *** *** ****** * ***** ********* *** ******* ************* *** *************, ****** ** **** ******* 4 ** ***** ****** *** **** * ******** ******* ** not *** *********:

***** *** ******** ** ***** **** *** **** *** ****, this *** *** **** ** ***** ******* ***** *** ****.

***** ** ***** ** ******** ** ****** ** *** ***** International ******* ***** ******* ** ***** ******** *******.

* ***** ****'* **** ******* *** ******** ******** ** ******* models. *** **** ****** *** ******** ***'* "*********" ** ******** because **** ****'* ******* ** **** ******* **** ***.

*** ****** ****** ** *** ***** ********* *** *** ***** complete/international **** *** **** **** *** *** ******** (******* **** the ******* *** ********* ** ** **********).

*** **** ****** *** ******** ***'* "*********" ** ******** ******* they ****'* ******* ** **** ******* **** ***.

*********** **** ************* *** *** **** ****** *** ** ****, Dahua ****** **** *** *** **** ******* ********* ** *** same ****, ** ****** * ***, ** *** *** *******.

***, **** *** **** ***** *** ****, **?

*** **'* **** ****... **********!

**, ** ** ***** *** * "*******" ******** ********... *** many ****** ***** ** **** ** **** ***** ** *** of ***** ****** ********* ** ***** *** *** ********???

***** *** ****** *** ********?

**** ***** **** ** *****...

***** ****** * ****** ***** *** ******** **** ** ************* series **** *****, ** * ********** **** *** ***** ***** was *** **** ****** ************* ** ******** ************ ***** ******************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Deceptive ASIS Attendance on Oct 06, 2017
ASIS is being deceptive with its conference reporting, effectively inflating the event's real actual attendance. What they try, but struggle to...
Dahua Trying, Struggling To Respond To Hacking Attacks on Oct 04, 2017
Now, 2 weeks since large-scale hacking attacks commenced against Dahua vulnerable devices, we analyze Dahua's response. On the positive side,...
Hikvision USA Misleads Dealers On Backdoor on Oct 03, 2017
Hikvision USA emailed their dealers overnight with their 5th cyber security 'special bulletin' of the year. Misleading Unfortunately, they...
FLIR Thermal Camera Multiple Vulnerabilities, Patch Released on Oct 03, 2017
Multiple cyber security vulnerabilities exist in FLIR thermal cameras, which have not been fixed, despite being reported months ago. In this note,...
Hackers Globally Attacking Dahua Recorders on Sep 25, 2017
Dahua recorders are being hacked and vandalized around the world, as confirmed by dozens of reports to IPVM since the attacks surged 5 days...
'Clowns' Allege Ubiquiti 'Completely Fraudulent' on Sep 20, 2017
A short seller has alleged Ubiquiti is 'completely fraudulent'. Ubiquiti's CEO has responded calling them 'clowns'. Here is the short...
Cloud Guy Prints Book, Misses Irony on Sep 15, 2017
On-premise security systems are dead. But $75 print books are alive and well. Such are the lessons from Brivo's CEO new book "The Five...
September IP Networking Course on Sep 14, 2017
LAST Chance - Registration is ending. Register now. This is the only networking course designed specifically for video surveillance professionals...
The 3 Most Outstanding Security Manufacturers (OSPAs) Make No Sense on Sep 08, 2017
The Outstanding Security Manufacturer finalists (US edition) are here: And if you are wondering, "How did those 3 get chosen?" then you are...
Hikvision Backdoor Exploit on Sep 03, 2017
Full disclosure to the Hikvision backdoor has been released, allowing easy exploit of vulnerable Hikvision IP cameras. As the researcher, Monte...

Most Recent Industry Reports

Cisco Falling - Favorite Network Switches 2017 on Oct 20, 2017
1 major manufacturer fell and 1 outsider manufacturer gained as integrator favorites for network switches from more than 140 votes / explanations...
Uniview Recorder Backdoor Examined on Oct 20, 2017
A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua...
Hikvision Access Control Tested on Oct 19, 2017
Hikvision aggressive pricing and marketing combined with generally reliable hardware and free software has made them a major player in video...
Verkada, Silicon Valley VSaaS Startup, Targets Enterprise on Oct 19, 2017
Verkada says they are building an enterprise-class VSaaS offering, calling it "The new platform for video security". This is a departure from the...
Exacq Unbreaks Avigilon Integration on Oct 18, 2017
For nearly 4 years, Exacq had broken and effectively blocked use with Avigilon cameras, as IPVM reported in January 2014. Now, Exacq has...
Search More Important Than Live Monitoring - Statistics on Oct 18, 2017
Search is overall more important than live monitoring to integrators, according to new IPVM statistics.  The key themes found in integrator...
Axis 'Sold Out' P3707-PVE Multi-Imager Tested on Oct 18, 2017
Axis faced significant product shortages over the summer. Perhaps the most notorious and significantly sold out model was the Axis P3707-PE 8MP...
Dahua Removes Auto Rebooting on Oct 17, 2017
For years, Dahua has automatically programmed its IP cameras to reboot weekly, a highly atypical and questionable practice. Following IPVM...
Deep Learning Tutorial For Video Surveillance on Oct 17, 2017
Deep learning is a growing buzzword within physical security and video surveillance. But what is 'deep learning'? In this tutorial, we explain...
Multipoint Lock Access Control Tutorial on Oct 17, 2017
Doors are notoriously weak at stopping entry, and money can be misspent on wrong locks that leave doors quite vulnerable. While closed and locked...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact