FLIR is the first Dahua OEM partner to issue a statement following Dahua's backdoor disclosure:
Certain FLIR and Lorex branded products that are produced by Dahua may be affected by this vulnerability.
To reduce concern / problems, they highlighted many product lines that are not from Dahua:
Please note that the following product lines are NOT affected by this vulnerability:
FC-Series ID, FC-Series S, FC-Series R
PT-Series, F-Series, D-Series
Meridian, Horizon, Latitude Series
FLIR FX, FLIR Secure HD
However, that still leaves a lot of Lorex products and lower end FLIR branded devices that are Dahua OEMs.
Unlike Dahua, FLIR emphasized the benefit of their existing cloud management feature on a number of their Dahua OEMed devices:
Many of these products are already protected from this vulnerability due to the external connection being managed by FLIR’s Cloud connection service. With the device connected to the internet via the FLIR Cloud service, we have confirmed that these devices are no longer vulnerable to this issue.
Also, FLIR went further than Dahua, advising strong action for those not using their cloud service with Dahua OEMed products:
Until this issue is resolved, our recommendation is to immediately disable DDNS, disable all port forwarding and, if available, turn off UPnP.
However, FLIR acknowledges that Dahua still has not provided clarity and a solution to the vulnerable devices:
We are continuing to work with Dahua to discover exactly which products are affected, and when patches will be available.
One obvious question that comes to mind is why would FLIR, Honeywell, Tyco, etc. choose Dahua?