Geovision Unprecedented Security Vulnerabilities And Backdoor

By: John Scanlan, Published on Feb 06, 2018

Cybersecurity vulnerabilities have plagued the video surveillance market.

Now, Bashis, discover of the Dahua backdoor, has discovered 15 security vulnerabilities including a backdoor that widely impact GeoVision's cameras.

Inside, we test Bashis proof of concept and report on:

  • Ease or difficulty of exploit
  • Demonstrations of backdoors
  • Link to hack our camera
  • Vulnerability resolution
  • Potential collateral damage
  • Reach of impact compared to others

**************************** **** ******* *** video ************ ******.

***, ******,******** ** *** ***** backdoor, ************* ** ******** *************** including * ******** **** widely ****** *********'* *******.

******, ** **** ****** proof ** ******* *** report **:

  • **** ** ********** ** exploit
  • ************** ** *********
  • **** ** **** *** camera
  • ************* **********
  • ********* ********** ******
  • ***** ** ****** ******** to ******

[***************]

Key ********

******** ********* ******* *** have ***** *********** ***** in ***** ***/** ***** along **** ******* ***** exploits ***** *** *** easily ********. ********* ******* with ******** **** ****** December **** ****** ********* *********** (********* ******** source). ** *********** *** Geovision ******* *** ****** on ***** ******* ** applications, ****** ***** ********* as ****.

NOTE: *** ******* *** ********

**** **** ********* **** several ****** **** ******* (such ** ******-********** **********) ***** ************** ** ***** ********.

Remote **** ******

**** ****** ** ******* with * ****** **** command ** *** ********** camera. *** ************* ***** illustrates **** *** ****** is ********* *** ********** with *** *********** ** root / ****. *******, after ******* * **** command, *** *********** *** changed ** **** / IPVM *** **** ****** is ******* **** *** next ***** *******.

**** **** *** ******** on *** ****** ****** camera (****://************.******.***:**)*** *** ******* **** to ****** ***** ** root *** *** ******** to **** **:

**** -* ****://************.******.***:**/*********.***?**************=****\&*****************=****

*** *** *** ** for ******** ******://************.******.***:**.

Clear **** ***********

*** **** ************* ******** a ***** *** ** camera *********** ** ***** text:

**** **** *** ********* on * ****** ** our *** *** *** command **** ** ***** the ******'* ***********, ********* usernames *** ******** ** clear ****, **:

**** -* "****://*******/************.***?********=*********&********=%******%**%**%**%**--%*********%******=%*********%**--%**%**%*****/*****.***%**&*********=*&**********=*&*******=*&******=*&***=*****" ; curl -* "****://*******/***.***/***/*****.***"

************************

**** ** *** *************** can ** ********* **** a **** ******* **** uses *** ** *** camera's *** *******, *.*., from ****** ***:

Exploit ******

***** *** ******* ****** vulnerabilities **** ****** *** discovered, *** ***** ** a ***** **** ** what *** ** **** with ****.

  • ***** *** ****** '*****' to '****' *** *** password
  • ****** ****** ****** ******** back ** *******
  • ************ ******* ** ********.
  • ****** ** ******** ****** for ******** ******* ********
  • ****** ** *** (****) and *** (*****), ***** allows ******, ******* *****, etc.
  • **** *** ********, ********* login *** ********* ** clear ****
  • *** * ******** **** the ******

******* **** ** ******** and *********** ****** **** ***** with ***** ******* ******* to *** ********.

Limited ****** *******

** * ****** ********* at *** **** ** publication ********* *** ****** ****** GeoVision ******* **** ** Shodan.io, ***** ** ***** low, ********** *********'* ******* modest ****** ***** (***** of *******************'* ***,***+ ******* ******).

Test **********

** ****** ******' *** with * ********** ********* cameras, *** **-*******: **.** 2017-06-19 *** **-*******: **.** 2017-06-26.

Positive ******** / *********** **** *********

*** ******** ******* ** note, ******, ** ********* in *** ******* *****, reported **** ********* *** cooperative *** ********** ** dealing **** *** ****** that ****** ********:

Severity ****

*** ******** ** ***** vulnerabilities ** *************, ***** the ******* ** ****** backdoor **** ****** *** to ******* ******** *********. We ****** **** ****** assessment **** **** ** most ****** *** *** lazy ******, ****** **** done ** *******. *******, regardless ** ******, *** severity *** ********** ** exploiting ***** *************** ****** significant **** ** ***** Geovision ******** ***** *******.

Comments (25)

*** ********* ******** *** ***** *** * ***** ** ***** these ********? **** ******* ** *** **** **** **** ********** of ***** ** ****.

*'* *** ********** **** **** *** *** ** **** ****, Geovision *** ** **** ** *** *** *************** *** ****** their *********. *** ***** **** ********** *** ********* ******** ** the **** **** ** *** ***** ******* *** **** (**** one ****** **** **** *****), *** ** * ***** ****** and *** ******** ******* **********. ** **** ****** ** * sent **** ******* ** *** ****** *** *** *** ********** or ********.

**** * ****, **** ****** **** * ***** ** ***** following *****, **** ***** ********* *** *** ** *******.

********* ******* *** ** ***** *** ******** *******

******** ******* ******** *** *************

*** ** **** ******* ******* **** *** ******** ***. * am ******* ** ********* ******* *** ** **'* ****** ***** partners ***** ***** ******** **** **** *** * ********** ****** the **** **********.

***** **** ***;

********* **** ******** **** * **** ***** ********* *** ********* to ***** **** ***** ********* ******* *** ***** *** ****** available ********:

**?

* ********** ****'* ***** *** *****, *** * ***'* ***/**** very **** ********* ******* (**** **** **). ********* ** ***** integrators *** *** **** ****** ******** **** ********* *** * heads ** ****** *** **** **********.

***********.

* ***** **** **** ** ****** **** **** ******** ** get *********/*********** ***** ** ****** **** **********, ** *** *********** knows **** **** ** **** ****** *** **** ** **** happen. (***** * *** ** ****'* ****** *** **** ***)

***. ***** *** * ** ****** ****** ** ***** ********** differed **** ****.

*'** ****** *** ** **** ********.

* ******** ** ***** **** ********* ** ******* ****, ***** prompted *** **** ** *** ***** ****** ** *****.

*'********** ** ***** ** *** ****** ******** ** **** **** ***.

(** - **** ** ***** ** **** ***** *** ****)

********* **** **** *** ** ***** ** ******** **** ******* with ** ******, *** ***** ** ******** *******.

* **** ***** *** *** ** *** ****** ******** ** our***** ******.

** ***** ****** ***** ****:

"** *** **** ** *** ******** *************** **** **** **** reported ** ****, ********* *** ******** *********, ** ***** ** a ******* ****** *** **** ********** ****** *********** *****, ** releasing * ****** ** ******** ******** ** ******* *** *****."

****, ****** *** *******. * ** ***** ******* ***** ********* referencing **. ** ********** *** *** **** **** ********** *** their ******* ******* ************* *** ******* ********, ************ ***** *** bad ***** ******** / ****** ***.

** * ********, * ** ***** ** ******* * ******* in *** **** ********** ** **,*** ********** *********** ********* **** for ***** ************* ******** *** ****** ** ****.

"**** ********** *** ********** ** ******* ********, **** ******* *********** on **** ****** ****** ***, **********, **** *** ***."

**** *****'* **** **** "********" ***** ****... ****-*** ******** **** did *** **** **** **********.

*******, ********* ************** *** ******** ** ***** ***************. ** **** clearly ******** ** *** ******* ********. ******* **** ****** ** as ** ** **** ********* ** ********** ****.

********, ***** ** **** ***** **** *** *** ** **** related ** **** *****?

*** ***** ** **** **** *** ******* ****(**** ********)*** **'* ******* ******* *** **** *** **** ***** ** put **** ** ***** ******* **** ****'* *** **** ********** to **** **** ******* (***** **** ****'* ****).

*******, *** ***** ** *** ***** **********. ** ***’* **** permission *** ********* ** *** ** ** **********. ********, ** is * ********* ** ******** ** *******.

* *** **** *** *** *** ** **** ** *’* happy ** ******* *** ********. *** ***** *********, *** ** know.

*** **, *** *********** ***** "*******, ****** *** ****** ****** ***, *** *** ******** **** ******** ** *** ******** *** criticism, **** *********, ********, ***."

*** ***** **** *** ******** **** * ********** ***** ********** a *** "*******" ******** **** **** *****.

*** ****** ** **** *** *** **** ** ** ***** day *** * *** **** ***** ** **** ****** *** in * ******* **** ***** **** **** ****** ******* **** didn't ***** **** *****. *** *** ******** ****** **** *** that * ****** **** ****** ***** **** **** ********** **** omitted.

**** ** * *****.

****** *** **** ** ***!

*******, ******!

*** ***** ********** ***** *** **** ***. ****'* *********** ******** law. *******, ** *** ** ******** ** *********.

**** ********* *** ***** *** *** **** *********, ******** *** criticism. ** *** * ******* ** ***** *********. ** ********, if ***** ** ******** ***** ***** ** *** ***** **, that ********* ***** ** **** ***.

**********, ******, **** ***** ** *********. ** **** ******* ** that, *** *** **********, * ****** ***** ************* ** ****** your ***** ** ******* **********, **** ***** **** **** *** distorting *** ********.

* *** ** ********** * ****** ** ******** **** ** the **********: (*) ****** ****** **** ********* ************** *** ******** and (*) ** ****** ** ***** ************* **** ***** ** comes **** *** ******* ** ******* *********.

*******, ***’* *** * *** * ******** *****. *** ***** a ****** ****** ****’* ******** ** **** *********** *** **’* terrible. **** * **** *** * ********* ****** **** ******* praised *** ******** *** ***** *********** *** * **** *** the **** ***** *** ****** *** ******** *** ********. **** is ********* ** **** ******** ****.

*** **, *** ****** **** ** *** ****** ** ** response *** ** *****, * ** ***** **** **** ****** what **** **** **** ****** :)

****, **** ******* ** *** ******, ** **** **** ** that *** ****** *** ******* * ********** ** * ******* forum **** **** *** **** ************* ** ***** ****** *******. If **** **** ** ******* ********, ** ****** ** ***** communications **** ******, ** ****** ** ******, *** ***** ******* of **.

* ***** **** ********* *** * **** ******* **************.

** **** *******, *** ********* ** ****** ******** *** ******** as ** **** **** *** ***************.
*** * *** *** **** ********* **** ****** ****** ******** update.
*** *******, * *** *** ******* ****** "****** **** ******" and "***** **** ***********" ***** **-******* */*:*.**.
** *** ***** ****, ** *** ******* ****** ** **-****** F/W:3.12.

** *****, * ***** **** *** *** ******** / ******* are ********.

** ** ******, * ***** ** ***** *** ******** ** IPVM ********.

**, ***** *** *** *** *******. ** ***** * **** to *** ****** ** ******* *******. *** *** ******* **** not *** ********* ******* *** ******** ** **** *************.********* **** ******* ********** ******* ***** *** *** ******** ** ***** ***************. *** GV-EBL2100 ******* ** ** *** ** *** *** ****** (******** 1.x).

** ** *****, ***** *************** ** ****** ****** *** ********* cameras.

*** **** ******* ***** ** ********** ******?

***** ** *********** ** ****...

*********** **** ** **** **** ********* ***** **** ************ ** the ** ******* **** ** **** ** *** ***** ********:

******* ******* **-*******

******* ******* ******** ***************

*******: **** ******** ** ****** *********

******

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...
Register Now - Fall 2019 IP Networking Course on May 02, 2019
Register for the Fall 2019 IP Networking Course. For early registration save $50 off the course's normal $299 price. This is the only networking...
Locking Down Network Connections Guide on Apr 23, 2019
Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Hikvision Favorability Results 2019 on Mar 18, 2019
Hikvision favorability results declined significantly in IPVM's 2019 study of 200+ integrators. While in 2017 Hikvision's favorability was...
Bosch VDOO 2018 Vulnerability on Dec 20, 2018
Security research firm VDOO has discovered a critical vulnerability in Bosch IP cameras. Inside, we cover the available details of this new...
Genetec UL Cybersecurity Certificate (2900-2-3) Examined on Dec 19, 2018
Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates? Earlier in 2018, a...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...

Most Recent Industry Reports

Repositionable Multi-Imager Camera Shootout - Avigilon, Axis, Dahua, Hanwha, Hikvision, Panasonic, Vivotek on Jun 19, 2019
Repositionable multi-imager cameras are one of the fastest growing segments in video surveillance, with a slew of new offerings being recently...
Genetec Synergis Cloud Link - Complex, Costly and Confusing on Jun 18, 2019
Genetec's Synergis Cloud Link is complex, costly and confusing compared to competitor access control architectures. Inside this note, we examine...
Startup Vaion Launching End-to-End AI Solution Backed with $20 Million Funding on Jun 17, 2019
An EU / USA video surveillance startup, Vaion, founded by ex-Cisco Senior Directors is launching an end-to-end VSaaS platform with $20 million in...
Biometrics Usage Statistics 2019 on Jun 17, 2019
While face and fingerprint recognition are used regularly for smartphones, it is not as common in physical security. In this note, we examine...
The Scheme Hikvision and China Importers Use To Avoid Tariffs on Jun 17, 2019
Hikvision and numerous China importers are avoiding 25% tariffs by including an SD card slot in their IP cameras to claim they are 'digital still...
Sighthound Transforms Into Enterprise AI Provider Profile on Jun 14, 2019
Sighthound is now rapidly expanding its R&D team, building an enterprise AI service. This may come as a surprise given their origins 6 years...
ADT Eliminating Acquired Brands, Unifying Under 'Commercial' Brand on Jun 14, 2019
ADT is eliminating the brands of the many integrators it has acquired over the past few years, including Red Hawk, Aronson Security Group (ASG),...
NSA Director Keynoting Dahua and Hikvision Sponsored Cybersecurity Conference [Canceled] on Jun 13, 2019
The technical director for the NSA’s Cybersecurity Threat Operations Center will be keynoting a physical security cybersecurity conference that is...
Farpointe Data Conekt Mobile Access Reader Tested on Jun 13, 2019
California based Farpointe Data has been a significant OEM supplier of conventional access readers for years to companies including DMP, RS2, DSX,...
Embattled $400 Million China Funded Philippines Surveillance System Proceeds on Jun 13, 2019
An embattled 12,000 camera surveillance system project that will cost ~$400 million will proceed.  The project contract was awarded, had its...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact