Dahua Suffers Second Major Vulnerability, Silent [Finally Acknowledges]

Author: Brian Karas, Published on Jul 25, 2017

Less than 3 months ago, Dahua received DHS ICS-CERT's worst score of 10.0 for their backdoor.

Now, Dahua has received another 10.0 score for a new vulnerability. Despite that, Dahua has remained silent.

In this note, we examine the vulnerability, Dahua's poor handling of this, compared to competitors Axis and Hikvision, and the potential impact to Dahua.

[Update: After the publication of our report, Dahua has finally acknowledged the vulnerability]

**** **** * ****** ***,***** ******** *** ***-****'* ***** ***** ** **.**** ***** ********.

***, ***** *** ******** ******* **.* ***** *** * *** vulnerability. ******* ****, ***** *** ******** ******.

** **** ****, ** ******* *** *************, *****'* **** ******** of ****, ******** ** *********** **** *** *********, *** *** potential ****** ** *****.

[******: ***** *** *********** ** *** ******, ***** *** ******* acknowledged *** *************]

[***************]

Vulnerability ********

*****'* *** ********* ** ********** ** ***** ****** ********, ********* ** ****, ********* ** *** ** ***. ************, the ***** ***** *** *** ***** ********, ** *** **** first **** *** *** **** ********** ** *** ******, **** not ******** ***** **** ******. **** *** ** **** ** an ******** ** ****** *********** **** **** ** *** ******** field, *** ******* * ****** ******** ** *** ****** **** that ********* *** *****.

****** ********* *** ** ********* ** ***** ** ******** ** disable *** ******, **** **** ******, ** ********* ********** *** unit. ******* **** ************* ****** ** *** ***** **** ******, no ************** ** ******** ** ******* **, *** *** ****** with ****** ****** ** ** **** ** *******.

*** ****** **** **** ***** *** ******** ****** * ****** ago, ** *** *** ** ***.

Models ********

***** ***** ** ****** **** *** ******** *** **** ***** has ******** * ******** ***, *********:

*******, ** ** *** ***** *** **** ***** ****** *** impacted. *** *******,***** **** **********, **** ****** *****, ** ******* *******, **** ***** *******, part ******* *** ******* *** *** **** *********** ********. ********, as *** ***** **** *** ***** ********, ***** ***** ****** code ****** ******* *****, **** ***** ****** ***** ** ********.

No ********** / ** ******

***** *** **** ** ******** ********** *** ****** ** **** disclosure, ***** ** ******** ** ***** ******* ** ** ******* below *** *****'* ***********.

**** *** ******* *** ** ******** ******** ** ***** *** has ******** ** **-***-****** ******** ***** **** ****** *************

Fix **********

*** *** **** ************* ****** ******** * **** ** ******** on *****'* ************* **** **** ***** *** *** *************. *** that ****, *** **** ** *****'* ************* ***** *** ****, returning *** ******:

******: ***** ** *****, *** **** / ***** *** *** active.******** ******** ** *** *** ************* ****.

*****'* ***** ******* ******* ** **********, *** *** ** ********* to **** *************, *** **** ************* ****** ***** **** ***** 2017:

**** *** ******** ************* ******* **** **********, ** ** **** listed ** ****** ******* ***** ***** *** **** ****** ********.

Researcher **********

*** **** ******* *********** *****, ** ***** ******** ************ ************, *** **** ******** (** ****/*********** *****) **** *** ********* of *** *************. ******** ************ ******* ** ******* ********** ******* of *** *************.

Violates ******** *********

*** **********, **** ** *** **** *** ********* **** ******* vulnerabilities:

*********'* ******* ************** ***** ********** ***** **** ****** *************, *** ***** ** firmware *******:

**** ******** ******* ** ***** ***************, *** ***** ** ********, on ************ ************:

**** ** ***** ******** ** *****'* **** ** ***************, **** of ********, *** ** *** **** ** **** ***********, **** of **** ********** ********.

******

*** ******* ** **** ***** ********* ** **** ** ********* poor ***** ******, **** **** ******* *************** *** **** ******* to ******** ****** *** ****** ***** *********. ** **** ***, we ** *** *** **** ********* ***** **** *****, ** some *****, **** ** ******** ** ***** *** *****. *******, it **** **** *** ********* ** ********* ***** ** ** acknowledge *************** **********, *** ******* ******** **** ********* *** *****.

Vote / ****

******

****** **** ****:***** *** *** ****** * ***** ********* *** ******* ************* *** *************, ****** ** **** ******* 4 ** ***** ****** *** **** * ******** ******* ** not *** *********:

***** *** ******** ** ***** **** *** **** *** ****, this *** *** **** ** ***** ******* ***** *** ****. The ************* *** ****** ******** ** **** **** **** *** the **** ****** **** ***** *** ******** ** *** **.

***** ** ***** ** ******** ** ****** ** *** ***** International ******* ***** ******* ** ***** ******** *******.

Comments (34)

***** ** *** **** ******* **** *** ******** ****** ** the ****** **** ***** ** **.

**** ** * ******* **** ****** ~$* ******* ** ****** revenue, **,*** ** ** ********* *** ********** ***** ** ** even *** ****** *****.

***** ****** **** *** ******* ****** ******* ***** ** ******* they ****** **** *** *********** ********** ** ******* ******* **.

* ***** *** ******* ******* ** **** *** *** ******** poor ** ** *** ********** ******** ********.

* ***** *** **** ***** ** ** - **** ** you ***** ** ***** ******** *** ********?

******: "**** ** *** ***** **the ******* ** Dahua security and response?".

***'* **** ** ***** *** ****** ***** ** ** *************** found ** ** ******* *** ** *******. **** ** *** nature ** * ******** ***** ******* *** *** *** **** people *** ***** **** ** **** ***** *** ***** *********** harm. ******* *** *************** *** ********** ** *** ************ ** a ***** *** ****** *** **** ** **** ********** ** safe ** ********. *** **** ******** *** *** ********* ** a ************, *** * ***'* **** ***** *** ******, ** how **** ****** *** ********* *** *** **** **** ****** the *********. ************* **** ** **** ***** *** ***** **** their ** ** ***** *** ******* *** ********** **** **** of *** *****. ** ** **** ** **** ********* ******** want-to-be ********* *** ****** ***** *********, ** ******* ** ******** IP ****** ************. * ***** ********* *** ****** **** ** these ********* ***'* **** ** ******* ******* *** *********** ** due ** *** **** **** ****'* ******** *** ************* ********** and ***'* **** ***** **** ****'* ** **** ******** ******* and **** **** *** **** ***** **** *** ***************. ***'* face ** *** **** ******** *********, ** ** *** *** own **** ******* **** ***** *** *** *** ***.

*******, * ***** **** *** ***** *** ********** ** ********** "******* *** **********".

*******, * **** ***** **** *************** ****** ** ********* ***** on *** *********** *** **** **** *** ** *******. **** Dahua, **** ** * *** **** ** *** *****. ***** recent *************** **** ** ** ***** ****** **** ******* ****** skill ** *******. **** ***** **** **** ********* ** **** as ****** ** **** *********** ******** **** *****'* ******** **** vulnerabilities **** *** ******* ** ******* ** **** ********* **.

****** ***** *** ** *********** *********. * ********* ** ***** about *** ******** ******** *** *** **** * ***** ** to *** ** ** **** ***** ******** * *** *** I *** ********** ******* ** *** * *** ******** ** do **. ** ***** *** ****** ***** ****** ** ***'* something **** ***** ** ****** ***** ********* ** ** **** average ******** ****.

* ********* ** ***** ***** *** ******** ******** *** *** what * ***** ** ** *** ** ** **** ***** products * *** *** * *** ********** ******* ** *** I *** ******** ** ** **.

*****,**** ** *** ****** ** *** / ******* *** ***** backdoor. **'* ****** ** ****** *** **'* ***** ******** ******* to ***. **'* *** **** *** ** **** ** *********** on ******** ******** ****.

** ***'* ********* **** ***** ** ****** ***** ********* ** by **** ******* ******** ****

*** ******* *********, ** **** ****** ******, ***** ***** *** clearly ******** *********, ***** ****** **** ********* ** **.

***** ********. ******** ************** ** ***** ** * **** ***** mistake ** **** :(

***

** **** ******** **** * **** **** ******* ** **** this ** ******* ** ***** **** *** ****** ***** *******, when ** ***** **** *** ***** ** ***** ** *** last **** *** * ****.

**** ** *****'* ****** ************* **** * **.* **** *****, and **** *** ****** *** **** ****. *** ******** ***, the***** *********** *********** **** ********, ** ** *** ********** **** ** exploit, ******** * ***** ****** ** *******, *** **** ******** sensitive **** (*********).

**** ******* ******** ********** ***** ***************, ***** ** **** ****** ** *********** ******* *********** ****.

...*** ***** ***** *** *** ***** ********, ** *** **** first **** *** *** **** ********** ** *** ******, **** not ******** ***** **** ******...

**** ** *****'* ****** ************* **** * **.* **** *****, and **** *** ****** *** **** ****. *** ******** ***, the ***** ********...

**** **** *** **** ** *** ***** *********...

*****'* ****** ************* ****, ********* *** ******** *** ****, *** been **** ** ***** * ***** ***.

*** *** **** ***** *** ****** ** ** *** ******* it *** **** ************* ** ****** **** **** ** ****** find / ****** *** *****.

********** **** **** *** ** *** ** ** **** ** comprehend *** * ******** ****** ********** ******* ***** **** **** issues.

******: ***** (** *****) ** *****, *** **** / ***** are *** ******.******** ******** ** *** *** ************* ****.

****** ** ******* ****** *** ****** ******** ;)

******. **'** ***** ******* ****** *** *** ********. *** ******!

**** ********** - *'* *** ******** * ****** ********...

** ***** ********** *** ********* ** ********, ** **** ** Sonia ******* **** *** ** **** ******** ** **** ******** chipset ******. *'** *** **** **** * *** *** ** in ** *** ****.

****, ** **** ** ***** ******* ** *** ******** *******, this ** *** ****** *** *** ********* (***** ** ******* in * ********* ********** ** *** ********)...

*** **** *********** **** ********** *** ******** ******?

***** ** *** ** *** *********, **** *** **** **** I've ****. *** * ************ ***** **** ** **'* *** the **** ******* ****** *** ** ****.

****, **** ******** ******* **** ******* ** ******** ****...***** *'** sold **** *-* ** ** * ***** ****? *****'* **** like **'** ****** *** **** ******** *******...** ***

**** *** ******* ** **** ******* ********* *** *****, * would *** ** ********* ** *** **** ***** ** ****. I ***** *** **** *** ** **** *** ** **** is *** ****, ** ** *** **** ******* *** ** exploit *** ** *****, ** **** ** *** ** ********* FW ******* *** *** ** ****** **** *****. ******** **** that *** *********** **** ******* **** ******** ************* **** ** the ****** **** ***** ******.

**** *** ******* ** **** ******* ********* *** *****

#*, ******. *** *** ********* ** **** '*********' *** '*****' are *** *** **** ****** / ******?

**,

********* *** ***** ** *** *** **** ******** **** *****'* devices, ***** *** ********** ** **** (**** ** ****) *** naming ** *** ******** ******, ********* **** "*******" **** **** been ******* *** ******** ***.

**** **** ****** ** ****** *** ******, ****/***** ******, *****, RTSP, ***** *******... ***, ** ***** - **'* *** *** binary **** ****** ****** ********** ********* ********** ******** *** ********.

*** *********** ***** **, **** **** *** ***** **** ****** code *** *** ******** *** ********* "*******" ** ************ (***/****... or ********), *************** ***** ** *** ************/******* *** **** ****** to ***** ** *** ****** ** **** (*'**).

**** ** *** **** **** ******** ********, ** ********* * ***** *** ** ********* **** **** flaw ***** ** **** ********* *** *****, *** ** ************ exploited *** **** ****** **** (** *** *********/***** ******** **** as ****).

*******, ***** ***** ** * ********** ** *** **** **** for ******** - ***** *** **** **** *****, *** ***** exist ***** ********* *) ******, *) ***** ***** **** *** 3) ***, *** ** ***** ****** **** ***** ** ******** who ******* "***", *** **** ***** ****** **** *** ********** devices.

******, **** ***** **** * *** ** **** *** "*****" binary.

~ # ** ** | **** *****
*** **** ***:** /***/***/***** ****
*** **** *:** **** *****
~ #

~ # ******* -*** | **** *****
*** * * *.*.*.*:***** *.*.*.*:* ****** ***/*****
*** * * ***.*.*.*:**** *.*.*.*:* ****** ***/*****
*** * * ***.*.*.*:**** *.*.*.*:* ****** ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ****** ***/*****
*** * * :::*** :::* ****** ***/*****
*** * * :::** :::* ****** ***/*****
*** * * :::***** :::* ****** ***/*****
*** * * :::***** :::* ****** ***/*****
*** * * :::*** :::* ****** ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * ***.***.***.***:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * ***.***.*.**:***** *.*.*.*:* ***/*****
*** * * ***.***.***.***:***** *.*.*.*:* ***/*****
*** * * *.*.*.*:***** *.*.*.*:* ***/*****
*** * * ***.***.*.**:**** *.*.*.*:* ***/*****
*** * * ***.***.***.***:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ***/*****
*** * * *.*.*.*:**** *.*.*.*:* ***/*****
*** * * ***.***.***.***:***** *.*.*.*:* ***/*****
**** * [ ] ***** *** ***/***** /***/***/**************-******
**** * [ ] ***** ***** ***/***** /***/***/************-*

******! **** *******.

***, ******** *******, ** *** ******** ****************:

***** (*** *****) *** ***** (*** ******/********) ** **** *** name ** * ****** **** **** ******** **** *** *** and *** ***/*********** ********* ** *** ***/***/***.

**** **** **** *********** ** *****. ** *** ***** ***** is * ***** ***** ** ******* *** ********? *** *** sense ** **** *** ******* **** **?

**** ***********, ***** **** **** ** ** **** *********, ***** and ***** ***** **** ****.

*** *** ** *** ******** ***** ** "*** ********" ********* Hikvision, *** - **** **** ** **** *** ****** **** provides **** ******** (***** *******), *** ** ******** ** **** Dahua *********/***** *** ********* *******, * **** *** ***** **** davinci ***** **** **** ** *********/***** - *** ****** *** quite **** ** ***** **** ********* **** **** ***, ** maybe **** **** ** *** **** ******* **** *** (*********** now, ** * **** *** ***** ** *** *** *** binary *** ******** *** ******** ******* - *** **** ***).

*** **** ** ****** **** * ********* ***.

# # ******* -***
****** ******** *********** (******* *** ***********)
***** ****-* ****-* ***** ******* ******* ******* ***** ***/******* ****
*** * * *.*.*.*:** *.*.*.*:* ****** ***/********
*** * * ***.*.*.*:***** *.*.*.*:* ****** ****/********
*** * *** ***.***.*.**:** ***.***.*.***:***** *********** ****/********
*** * * :::**** :::* ****** ***/*******
*** * * :::*** :::* ****** ***/*******
*** * * :::** :::* ****** ***/*******
*** * * :::** :::* ****** ***/********
*** * * ::*:***** :::* ****** ****/********
*** * * :::*** :::* ****** ***/*******
*** * * *.*.*.*:***** *.*.*.*:* ***/*******
*** * * *.*.*.*:**** *.*.*.*:* ***/*******
*** * * *.*.*.*:***** *.*.*.*:* ***/*******
*** * * *.*.*.*:**** *.*.*.*:* ***/*******
*** * * *.*.*.*:**** *.*.*.*:* ***/*******
*** * * :::*** :::* ***/*******
*** * * :::**** :::* ***/*******
*** * * :::***** :::* ***/*******
*** * * :::**** :::* ***/*******
*** * * :::***** :::* ***/*******
*** ***** * :::** :::* ** ***/*******

** * ****** **** *** **** *** **** **** ********* or **** **** ** ** **** **** **** *************. *****?

****, **** **** ******* ******* *****? *** ****.

** * ****** **** *** **** *** **** **** ********* or **** **** ** ** **** **** **** *************. *****?

***, ** ***** ** ** ****** ****** ** *** *** interface ** *** **** **** *** ****** ** **** **** this ************* ***** ******** ********.

****, **** **** ******* ******* *****? *** ****.

**** **** ****** ******* **** **** * ***** ************* ** your ******* *** ***** ** ** *****. ** ** ******** gains ****** **** ******* ******, **** **** *** *** **** vulnerability ** **** ****** ** *** *****, **** *******, ***.

***, ** ***'* ** ******** ** **** ******* *** ******** remotely **********, *** *** *******'* **** ****** **.

**'* *** ******** ** *** ** **** ******** ******. *** when *** *** ** *** ****** *** *********** *** ***'* give * **** ******* ** **** *********... **** **** ** just ***** *************. **** **** ***** *** ******, **** **** has ***** **** **** *** *********. ***** ***, **** ****, this *** ***** ****** ** ***** ************* ** * ***** period ** ****.

**** ******* * ***, **** ******* ***** *** ******* ***** help ********* **** ***** ******* **** ******, ** ***** ****** them * ******.

******* * ***** *** ** ********* ********** *****'* **** ** go ****.

*** *********.

******:***** *** *** ****** * ***** ********* *** ******* ************* *** *************, ****** ** **** ******* 4 ** ***** ****** *** **** * ******** ******* ** not *** *********:

***** *** ******** ** ***** **** *** **** *** ****, this *** *** **** ** ***** ******* ***** *** ****.

***** ** ***** ** ******** ** ****** ** *** ***** International ******* ***** ******* ** ***** ******** *******.

* ***** ****'* **** ******* *** ******** ******** ** ******* models. *** **** ****** *** ******** ***'* "*********" ** ******** because **** ****'* ******* ** **** ******* **** ***.

*** ****** ****** ** *** ***** ********* *** *** ***** complete/international **** *** **** **** *** *** ******** (******* **** the ******* *** ********* ** ** **********).

*** **** ****** *** ******** ***'* "*********" ** ******** ******* they ****'* ******* ** **** ******* **** ***.

*********** **** ************* *** *** **** ****** *** ** ****, Dahua ****** **** *** *** **** ******* ********* ** *** same ****, ** ****** * ***, ** *** *** *******.

***, **** *** **** ***** *** ****, **?

*** **'* **** ****... **********!

**, ** ** ***** *** * "*******" ******** ********... *** many ****** ***** ** **** ** **** ***** ** *** of ***** ****** ********* ** ***** *** *** ********???

***** *** ****** *** ********?

**** ***** **** ** *****...

***** ****** * ****** ***** *** ******** **** ** ************* series **** *****, ** * ********** **** *** ***** ***** was *** **** ****** ************* ** ******** ************ ***** ******************.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...
July 2018 IP Networking Course on Jul 12, 2018
Registration is closed. This is the only networking course designed specifically for video surveillance professionals.  Lots of network training...
Hikvision Covers Up Racial Profiling And AI Error on Jun 25, 2018
Faced with global scrutiny, led by the US government-funded Voice of America (VOA), Hikvision has covered up evidence showing their racial...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring (now US government banned) Dahua as a...
Debating Relevance of China Hacking US Navy Plans on Jun 11, 2018
"Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to...
Remove Dahua and Hikvision Gov Installs Required By US House Bill Ban on Jun 06, 2018
The final released US House Bill HR 5515 verifies that it not only prohibits the purchasing of Dahua and Hikvision products, it requires removing...
Dahua's Terrible Cybersecurity, Buys Credibility From PSA And SIA on Jun 04, 2018
Dahua has a terrible cybersecurity track record. But American organizations, like the Security Industry Association (SIA) and the PSA Security...
Canon Responds To IP Camera Hacks on May 30, 2018
Canon cameras made international news earlier this month, with reports of them being hacked in Japan (e.g., Hackers disable scores of Canon-made...
Corruption Alleged Against Hikvision Procurement In India on May 28, 2018
Over the past month, allegations of corruption and national security risk have made the news in India over the planned purchase of 150,000...

Most Recent Industry Reports

Backup Power For Maglocks Guide on Aug 20, 2018
When the main power fails, many believe maglocks must leave doors unlocked. However, battery backed up maglocks are allowed according to IBC /...
Axis Strong Q2 2018 Results on Aug 20, 2018
Axis reported strong Q2 2018 financial results and, for the first time in many years, Axis grew faster than Hikvision. However, the company's...
2Gig Gun Lock / Motion Detector Tested on Aug 17, 2018
Safer guns for families and an opportunity for security dealers to sell more services? That is the aim of Nortek's 2GIG 'Gun Motion Detector'...
Video Analytics Integration Guide on Aug 16, 2018
Video analytics is hot again (at least conceptually) but integrating video analytics with VMSes can be challenging. This is especially significant...
Hikvision IP Camera Critical Vulnerability 2018 Disclosed on Aug 16, 2018
The same day that the US government passed a prohibition on Hikvision cameras, Hikvision disclosed a critical vulnerability for its IP...
ISS VMS / Video Analytics Company Profile on Aug 16, 2018
Who is ISS? In the past few months, they had one of the craziest ISC West promo items in years. Then, they hired industry veteran and ex-Dahua...
Chinese OEM Avycon Gets ADI Push on Aug 15, 2018
Who is Avycon? An American company? A Korean company? A couple of guys relabelling Chinese products? The latter is the best explanation. While...
Backboxes for Video Surveillance Tutorial on Aug 15, 2018
Backboxes are a necessity in surveillance, whether for managing cable whips, recessing cameras, adding wireless radios. But it can be confusing to...
Genetec Stratocast / Comcast 'Motion Insights' Examined on Aug 15, 2018
Comcast recently announced "SmartOffice Motion Insights", an extension to their Genetec OEMed cloud video service (covered by IPVM here). This...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact