Hikvision, HWG Deceive FCC About New Critical Vulnerability [Update: Hikvision Issues Correction]

Published Sep 23, 2021 13:53 PM

Hikvision and its law firm, HWG, deceived the FCC in a lengthy submission filed on September 20th about Hikvision's critical new vulnerability impacting 100+ million devices.

IPVM Image

Despite days earlier admitting this critical vulnerability, Hikvision asserted to the FCC that "no vulnerability in Hikvision video surveillance equipment to date in 2021" by citing the Common Vulnerabilities List (CVE).

***********, ********* *** *** *** **** of ****** *** **** ***** ** this *** ******** ************* **** ******* it ** * ******** ** *** filing.

**** ******** ********* *** *** ****** herein:

IPVM Image

Hikvision ****** ** ***** **** ****

** ********* **, ****, ** *** firm****** ********* & *******, ******* *** *********, ***** ****** ** *** ***************** *** *** ***** *********/*****/******/******/*** **************.

*** ****** ******* *********** ***** ** Hikvision's ************* ******, ******** **** ********* "reports ** *************** [...] ** **** in ****" ** ****** ****, *** ******** ******** *** ******** vulnerabilities:

IPVM Image

"Stellar" *************

*** '** ***' ***** ********* *********'* argument **** *** ************* ** "*******" with "** ******** **********" **** *** equipment "** **** **********" **** ******:

IPVM Image

Hikvision ******** *** ** ****

*******, ****** **** **** **** * ********* entry*** *** ******** ************* ***** ***** that *********, ** **** ********* ********* (***),******** *** ************* ** **** **:

IPVM Image

*********, ****** ********, *** *************'* ****** **** ********* confirmed *********** *** ************* ****** ****, on **** **.

***** *** ***** ***********, ******** '"** vulnerabilities ** ********* ***** ************ ********* to **** ** ****' ** *****, since ********* *** ******* ******** * CVE ***** *** **** ***** *** vulnerability ****** **********.

Buried ** *** ******

******, *** ******* **** ***** **** vulnerability ******* **** ******** ** ** the *** ********** *** ****** ** as * ******** ** * ******** about *** **** ********:

*** *******, ** ***** **** * security ********** ***** *** ******** * vulnerability—six **** *****, ********* ******** * firmware *****, ******** *** ******** ******* a ******* ********, *** ******** *** public **** * ****** ** *** website.20

******** **, ** **** *****:

IPVM Image

******* ****, *** *** ********* ****** to ****, *** ******* ******* *** FCC **** ** ******** ** *************** to **** ** ****.

Updates *** ** ********* ****

*******, * **** ***** ******, **+ days ***** ******** *** ***, *** 3 ** * **** ***** ******** announcing *** *************,********* ******* *** *** ** ******** **** ** *** ************.

No ******** *** *** ****

** ********* ********* ** **** ** HWG *** *** **** ****** ** the ********* **********,**** ********, ****** ***** ** ***** ** the ***, ** ******* *** **** submitted *** ****** ** **** *** whether **** ***** ****** ** ******* the **********. ** ******** *** ********.

Update: ********* ******** **********

*********'* ******* *** ******** * ********** to *** ***, *******:

*** ******** ******** ******* ** ***** which *** *** ****** ** * conforming ****** ***** ************* *******. ********* submits **** ******* ** ******* **** the ********** ********** *** ******** ******** for *** ******* ***** ** ********* 20.

**** ****** *** ***** ********* **, 2021. ** *:** ** **** *******, IPVM ******* ********* *** *** ***** this *****:

IPVM Image

******** **** ******** ** ********, *** updated *** *** *******. *******, *** new ********* ******** ********* ********:

*** *** *********** **** ******* ** those ******* *************** ** ******** *** has *** *** ************* *** **** vulnerability ** ** *** **** ** this ******.

***** *** *** *** *** *** categorized *** *************, ********* ***, ****** it * **** **** ***** ** 9.8, ***** ** ********. **** ** material *********** **** **** **** ******* from *** **********. ** **** ******* out ** *** ** *** **** about **** *** **** ****** ** they *******.

Update: '** ********' **** *********

***** ********* *** *** ********* ** the ******** ** ****. ** ** 12:16 ** **, **** ******** * reply **** ********* ********* ** ** Global ************** **** *:** ** **:

IPVM Image

**** **** ****** **** *** ***** from ***.

Comments (14)
JH
John Honovich
Sep 23, 2021
IPVM

*******, **** *********!

********* ******* *** * ***** ******* with *** ** ********** (** **** they ***** *** ** ******* ** security **** ***** **** *** ****).

** ********* ****** **** **** ******* trust **** *** ** ********** ** pulling * ***** ***** **** ****. Honestly, ****'* *** **** **** **** approach? ** **** ***** *** *** is ******? *** *** ****** ***** what ** ********* **** *** **** known **** ** ********* *** *** law ****? ******'* ********* ***** **** trust ** ***** *******?

*** ***** ** * *** ** claims ***********'* **-**** ****** ** *** ** FCC*** ** **** ******* **** **** most ******** *** ****** **** **** week's ****.

(1)
(3)
(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

** **** ***** *** *** ** stupid?

****, **** *** * ********** ******...

AM
Andrew Myers
Sep 23, 2021

**'* ****** ******* **** ********* ** playing ***** ****, *** ** **** a ****** ******* ************:

**** *************** *** *** ******, ******

The ****** ** **** **** That is not what the CVE system was designed to do. I'll quote ********'* ********* ******** ******** ***** ********:

*** **** **** ****** ************ ** ** ****** ****** *********** for ******** ***************. **'* *** ******** to ** * ******** *** ******** database ** *** ***** *************** ** any *******. **** **, * ****** or ********** ***** ****** ****** ** not ******* * *** ****** *** a ***** ****. *******, **************** ************** **** ***** * ****** ** or***'* *********** ***** ******, ****** * ****** "bug *****" * ****** *********** ******** criterion. ****, *** * ******* ***'* have ** **** ******** ******* ** compare ********* **********. (*** **** *** bugs ***** * ****** **** *********...?)

**** ****, **** ** ****** **** you ** **** ***** **** **** of *************** **** **** ***** ** a ******* *** ****'** * **** starting ***** *** ********. *** *** amount ******** ******* ** *** *** of *** ******** *** *** **** attention ** ******** ******* ******** ********. You ***'* ****** ****** ** * lot ** *** *********** ***** **** the ******** ** ****** ******* ** if ** ******** ***** **** **'* particularly ****** ******* ********* * *** of *************** *** ******* *****. * personally **** ** **** ** ********** if ** ***** ******* *** * very ***** ****** ** ******* *************** because ***************** ** ****'* **** ******* **********.

**** ********* ***** * **** ** CVEs, **** *** ************ * ****** method ** ******** ********. *** *** flaws *** **** **** ******* **** you *** *** **** ** ** for **** ** **** *** ******.

*** ****** *** *** ****** ** evaluate ******, ******** ******** ******* *** other *****:

  • *** ******** ** **** *** ********* actively.
  • *** ****** ********** ****** ** ****** for *************** (*** ***** **** ****** bounties).
  • *** ******** **** *** ********* *** patched *******.
(4)
(5)
U
Undisclosed #1
Sep 23, 2021

**** *** ************ * ****** ******

****, ****** "************ ****** *******" *** pretty **** **** *********'* **** ********. Deny ***************, ******* ****** ***** *** company *********, *** ** **** ***** criticisms ** ****** ******, ***.

(5)
(1)
(1)
bm
bashis mcw
Sep 23, 2021

****, ********* *** *** *** **** ones *** ***** ****.

(3)
JH
John Honovich
Sep 23, 2021
IPVM

*****, **** ** ********** ********* ***** that ** **** ***************, ***** **** is *** ****** **** ***** ********** on.

****, ****** ******'* ***** ** **** point: "* ****** ** ********** ***** simply ****** ** *** ******* * CVE ****** *** * ***** ****"

(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

* ********** **** ** **** ** suspicious ** ** ***** ******* *** a **** ***** ****** ** ******* vulnerabilities ******* ***************** ** ****'* **** ******* **********.

**, ***** *** ******* ** ****** was ****** ** **** ****.

UI
Undisclosed Integrator #3
Sep 25, 2021

**** ********* ***** * **** ** CVEs, **** *** ************ * ****** method ** ******** ********.

**********. *** *** ************ ***********. ***** even **** ********

JH
John Honovich
Sep 24, 2021
IPVM

Update: ********* ******** **********

*********'* ******* *** ******** * ********** to *** ***, *******:

*** ******** ******** ******* ** ***** which *** *** ****** ** * conforming ****** ***** ************* *******. ********* submits **** ******* ** ******* **** the ********** ********** *** ******** ******** for *** ******* ***** ** ********* 20.

**** ****** *** ***** ********* **, 2021. ** *:** ** **** *******, IPVM ******* ********* *** *** ***** this *****:

IPVM Image

******** **** ******** ** ********, *** updated *** *** *******. *******, *** new ********* ******** ********* ********:

*** *** *********** **** ******* ** those ******* *************** ** ******** *** has *** *** ************* *** **** vulnerability ** ** *** **** ** this ******.

***** *** *** *** *** *** categorized *** *************, ********* ***, ****** it * **** **** ***** ** 9.8, ***** ** ********. **** ** material *********** **** **** **** ******* from *** **********. ** **** ******* out ** *** ** *** **** about **** *** **** ****** ** they *******.

(2)
U
Undisclosed #2
Sep 24, 2021
IPVMU Certified

*** *** *********** **** ******* ** those ******* ** ********.

”**** *******” ** **** “**** ****” - *** ** *** ******* *** the *** *****.

(1)
(1)
(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

”**** *******” ** **** “**** ****” - *** ** *** ******* *** the *** *****.

IPVM Image***·**·**

/ˈ***(ə)*ə*/**********, *********** **** *** *** *** ****."*** ****** ** ******* *****"********: ****, * ****** **, * few, *** **** ****, * ******* of, * ***** ***** **, *******, a ******* **, ********, ******, *******, divers

U
Undisclosed #2
Sep 25, 2021
IPVMU Certified

**** ******* ** ***** ******** **** sense.

(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

**** ******* ** ***** ******** **** sense.

**, ***'* ****; ** ******* **** the **** ********** **** * **** so ** **** ** * ********* definition *** ********

Avatar
Carl Stoffers
Sep 24, 2021
IPVMU Certified

Update: '** ********' **** *********

***** ********* *** *** ********* ** the ******** ** ****. ** ** 12:16 ** **, **** ******** * reply **** ********* ********* ** ** Global ************** **** *:** ** **:

IPVM Image

**** **** ****** **** *** ***** from ***.

(2)