This article is no longer available publicly. Please subscribe to read.

Hikvision, HWG Deceive FCC About New Critical Vulnerability [Update: Hikvision Issues Correction]

Published Sep 23, 2021 13:53 PM

Hikvision and its law firm, HWG, deceived the FCC in a lengthy submission filed on September 20th about Hikvision's critical new vulnerability impacting 100+ million devices.

IPVM Image

Despite days earlier admitting this critical vulnerability, Hikvision asserted to the FCC that "no vulnerability in Hikvision video surveillance equipment to date in 2021" by citing the Common Vulnerabilities List (CVE).

***********, ********* *** *** *** **** of ****** *** **** ***** ** this *** ******** ************* **** ******* it ** * ******** ** *** filing.

**** ******** ********* *** *** ****** herein:

IPVM Image

Hikvision ****** ** ***** **** ****

** ********* **, ****, ** *** firm****** ********* & *******, ******* *** *********, ***** ****** ** *** ***************** *** *** ***** *********/*****/******/******/*** **************.

*** ****** ******* *********** ***** ** Hikvision's ************* ******, ******** **** ********* "reports ** *************** [...] ** **** in ****" ** ****** ****, *** ******** ******** *** ******** vulnerabilities:

IPVM Image

"Stellar" *************

*** '** ***' ***** ********* *********'* argument **** *** ************* ** "*******" with "** ******** **********" **** *** equipment "** **** **********" **** ******:

IPVM Image

Hikvision ******** *** ** ****

*******, ****** **** **** **** * ********* entry*** *** ******** ************* ***** ***** that *********, ** **** ********* ********* (***),******** *** ************* ** **** **:

IPVM Image

*********, ****** ********, *** *************'* ****** **** ********* confirmed *********** *** ************* ****** ****, on **** **.

***** *** ***** ***********, ******** '"** vulnerabilities ** ********* ***** ************ ********* to **** ** ****' ** *****, since ********* *** ******* ******** * CVE ***** *** **** ***** *** vulnerability ****** **********.

Buried ** *** ******

******, *** ******* **** ***** **** vulnerability ******* **** ******** ** ** the *** ********** *** ****** ** as * ******** ** * ******** about *** **** ********:

*** *******, ** ***** **** * security ********** ***** *** ******** * vulnerability—six **** *****, ********* ******** * firmware *****, ******** *** ******** ******* a ******* ********, *** ******** *** public **** * ****** ** *** website.20

******** **, ** **** *****:

IPVM Image

******* ****, *** *** ********* ****** to ****, *** ******* ******* *** FCC **** ** ******** ** *************** to **** ** ****.

Updates *** ** ********* ****

*******, * **** ***** ******, **+ days ***** ******** *** ***, *** 3 ** * **** ***** ******** announcing *** *************,********* ******* *** *** ** ******** **** ** *** ************.

No ******** *** *** ****

** ********* ********* ** **** ** HWG *** *** **** ****** ** the ********* **********,**** ********, ****** ***** ** ***** ** the ***, ** ******* *** **** submitted *** ****** ** **** *** whether **** ***** ****** ** ******* the **********. ** ******** *** ********.

Update: ********* ******** **********

*********'* ******* *** ******** * ********** to *** ***, *******:

*** ******** ******** ******* ** ***** which *** *** ****** ** * conforming ****** ***** ************* *******. ********* submits **** ******* ** ******* **** the ********** ********** *** ******** ******** for *** ******* ***** ** ********* 20.

**** ****** *** ***** ********* **, 2021. ** *:** ** **** *******, IPVM ******* ********* *** *** ***** this *****:

IPVM Image

******** **** ******** ** ********, *** updated *** *** *******. *******, *** new ********* ******** ********* ********:

*** *** *********** **** ******* ** those ******* *************** ** ******** *** has *** *** ************* *** **** vulnerability ** ** *** **** ** this ******.

***** *** *** *** *** *** categorized *** *************, ********* ***, ****** it * **** **** ***** ** 9.8, ***** ** ********. **** ** material *********** **** **** **** ******* from *** **********. ** **** ******* out ** *** ** *** **** about **** *** **** ****** ** they *******.

Update: '** ********' **** *********

***** ********* *** *** ********* ** the ******** ** ****. ** ** 12:16 ** **, **** ******** * reply **** ********* ********* ** ** Global ************** **** *:** ** **:

IPVM Image

**** **** ****** **** *** ***** from ***.

Comments (14)
JH
John Honovich
Sep 23, 2021
IPVM

*******, **** *********!

********* ******* *** * ***** ******* with *** ** ********** (** **** they ***** *** ** ******* ** security **** ***** **** *** ****).

** ********* ****** **** **** ******* trust **** *** ** ********** ** pulling * ***** ***** **** ****. Honestly, ****'* *** **** **** **** approach? ** **** ***** *** *** is ******? *** *** ****** ***** what ** ********* **** *** **** known **** ** ********* *** *** law ****? ******'* ********* ***** **** trust ** ***** *******?

*** ***** ** * *** ** claims ***********'* **-**** ****** ** *** ** FCC*** ** **** ******* **** **** most ******** *** ****** **** **** week's ****.

(1)
(3)
(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

** **** ***** *** *** ** stupid?

****, **** *** * ********** ******...

AM
Andrew Myers
Sep 23, 2021

**'* ****** ******* **** ********* ** playing ***** ****, *** ** **** a ****** ******* ************:

**** *************** *** *** ******, ******

The ****** ** **** **** That is not what the CVE system was designed to do. I'll quote ********'* ********* ******** ******** ***** ********:

*** **** **** ****** ************ ** ** ****** ****** *********** for ******** ***************. **'* *** ******** to ** * ******** *** ******** database ** *** ***** *************** ** any *******. **** **, * ****** or ********** ***** ****** ****** ** not ******* * *** ****** *** a ***** ****. *******, **************** ************** **** ***** * ****** ** or***'* *********** ***** ******, ****** * ****** "bug *****" * ****** *********** ******** criterion. ****, *** * ******* ***'* have ** **** ******** ******* ** compare ********* **********. (*** **** *** bugs ***** * ****** **** *********...?)

**** ****, **** ** ****** **** you ** **** ***** **** **** of *************** **** **** ***** ** a ******* *** ****'** * **** starting ***** *** ********. *** *** amount ******** ******* ** *** *** of *** ******** *** *** **** attention ** ******** ******* ******** ********. You ***'* ****** ****** ** * lot ** *** *********** ***** **** the ******** ** ****** ******* ** if ** ******** ***** **** **'* particularly ****** ******* ********* * *** of *************** *** ******* *****. * personally **** ** **** ** ********** if ** ***** ******* *** * very ***** ****** ** ******* *************** because ***************** ** ****'* **** ******* **********.

**** ********* ***** * **** ** CVEs, **** *** ************ * ****** method ** ******** ********. *** *** flaws *** **** **** ******* **** you *** *** **** ** ** for **** ** **** *** ******.

*** ****** *** *** ****** ** evaluate ******, ******** ******** ******* *** other *****:

  • *** ******** ** **** *** ********* actively.
  • *** ****** ********** ****** ** ****** for *************** (*** ***** **** ****** bounties).
  • *** ******** **** *** ********* *** patched *******.
(4)
(5)
U
Undisclosed #1
Sep 23, 2021

**** *** ************ * ****** ******

****, ****** "************ ****** *******" *** pretty **** **** *********'* **** ********. Deny ***************, ******* ****** ***** *** company *********, *** ** **** ***** criticisms ** ****** ******, ***.

(5)
(1)
(1)
bm
bashis mcw
Sep 23, 2021

****, ********* *** *** *** **** ones *** ***** ****.

(3)
JH
John Honovich
Sep 23, 2021
IPVM

*****, **** ** ********** ********* ***** that ** **** ***************, ***** **** is *** ****** **** ***** ********** on.

****, ****** ******'* ***** ** **** point: "* ****** ** ********** ***** simply ****** ** *** ******* * CVE ****** *** * ***** ****"

(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

* ********** **** ** **** ** suspicious ** ** ***** ******* *** a **** ***** ****** ** ******* vulnerabilities ******* ***************** ** ****'* **** ******* **********.

**, ***** *** ******* ** ****** was ****** ** **** ****.

UI
Undisclosed Integrator #3
Sep 25, 2021

**** ********* ***** * **** ** CVEs, **** *** ************ * ****** method ** ******** ********.

**********. *** *** ************ ***********. ***** even **** ********

JH
John Honovich
Sep 24, 2021
IPVM

Update: ********* ******** **********

*********'* ******* *** ******** * ********** to *** ***, *******:

*** ******** ******** ******* ** ***** which *** *** ****** ** * conforming ****** ***** ************* *******. ********* submits **** ******* ** ******* **** the ********** ********** *** ******** ******** for *** ******* ***** ** ********* 20.

**** ****** *** ***** ********* **, 2021. ** *:** ** **** *******, IPVM ******* ********* *** *** ***** this *****:

IPVM Image

******** **** ******** ** ********, *** updated *** *** *******. *******, *** new ********* ******** ********* ********:

*** *** *********** **** ******* ** those ******* *************** ** ******** *** has *** *** ************* *** **** vulnerability ** ** *** **** ** this ******.

***** *** *** *** *** *** categorized *** *************, ********* ***, ****** it * **** **** ***** ** 9.8, ***** ** ********. **** ** material *********** **** **** **** ******* from *** **********. ** **** ******* out ** *** ** *** **** about **** *** **** ****** ** they *******.

(2)
U
Undisclosed #2
Sep 24, 2021
IPVMU Certified

*** *** *********** **** ******* ** those ******* ** ********.

”**** *******” ** **** “**** ****” - *** ** *** ******* *** the *** *****.

(1)
(1)
(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

”**** *******” ** **** “**** ****” - *** ** *** ******* *** the *** *****.

IPVM Image***·**·**

/ˈ***(ə)*ə*/**********, *********** **** *** *** *** ****."*** ****** ** ******* *****"********: ****, * ****** **, * few, *** **** ****, * ******* of, * ***** ***** **, *******, a ******* **, ********, ******, *******, divers

U
Undisclosed #2
Sep 25, 2021
IPVMU Certified

**** ******* ** ***** ******** **** sense.

(1)
UI
Undisclosed Integrator #3
Sep 25, 2021

**** ******* ** ***** ******** **** sense.

**, ***'* ****; ** ******* **** the **** ********** **** * **** so ** **** ** * ********* definition *** ********

Avatar
Carl Stoffers
Sep 24, 2021
IPVMU Certified

Update: '** ********' **** *********

***** ********* *** *** ********* ** the ******** ** ****. ** ** 12:16 ** **, **** ******** * reply **** ********* ********* ** ** Global ************** **** *:** ** **:

IPVM Image

**** **** ****** **** *** ***** from ***.

(2)