Hikvision UPnP Hacking Risk

Author: IPVM Team, Published on Dec 04, 2017

Hikvision IP cameras are being hacked even for end users who had not set up port forwarding and believed their cameras were 'safe' behind firewalls.

The problem is UPnP and, more specifically, how Hikvision has insecurely used UPnP over the years.

In this note, we look at the security risks of Hikvision's UPnP practices, steps they have taken to reduce it and vulnerabilities that sill remain.

Examples

Over the past few months, numerous confused and concerned users have found their Hikvision IP cameras hacked. The most common reported case is the camera being labeled 'HACKED':

In other cases, cameras are reset to factory defaults, as described by an integrator in an IPVM discussion:

What puzzles some of these users is that they know the risks of exposing their cameras to the public Internet, and contrary to Hivision's recommendation to port forward, they have not explicitly granted access to those cameras, which in their mind should keep them safe from external attack.

Vulnerability: UPnP NAT Traversal

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

As the integrator in the above-referenced discussion found out, after spending considerable time and effort troubleshooting, Hikvision had enabled UPnP Nat Traversal by default, as he explained:

Hikvision cameras enabled UPnP NAT traversal, automatically creating their own firewall rules to grant outside access until the May 2017, 5.4.5 firmware. This is a vulnerability of its own and combined with the Hikvision backdoor, it allows full control to anyone across the public Internet. Enabling UPnP NAT traversal by default, and combining it with an easily-exploited backdoor set these cameras up for attack. Attackers have recognized this, leading to large numbers of Hikvision cameras being altered to show "HACKED" text on the video feeds or being disabled entirely by having their configuration wiped out, or put into a reboot loop.

Failed To Explain UPnP Risk

Hikvision's poor communication on the 'privilege escalation' backdoor failed to explain the risks of UPnP. Indeed, Hikvision suggested the opposite that IP cameras should be safe behind other devices:

The overwhelming majority of Hikvision cameras are accessed through a connected NVR, Hikvision iVMS software, or third-party VMS software. As such, it limits the possibility for Hikvision IP cameras to be open to public access, lowering the risk of the cybersecurity exposure. To date, Hikvision is not aware of any reports of malicious activity associated with this vulnerability. [emphasis added]

Of course, now there are widespread reports of malicious activity, facilitated in many case by Hikvision's UPnP tactic and their failure to communicate these risks.

UPnP Enabled Firmware 5.4.0 And Earlier

In firmwares prior to 5.4.5, UPnP was enabled by default, with the camera's web interface showing three ports being forwarded for HTTP, RTSP, and "Server Port" (command/control data).

However, while the menu above shows only three ports, when actually enabling UPnP on a router, five ports were actually forwarded: the three above as well as 9010 and 9020, described as "IPC_CIVIL_CMD" and "IPC_CIVIL_STREAM."

A Hikvision bulletin describes these ports as used for Ezviz (Hik-Connect) Command and Live View, but live view is still possible via Hik-Connect/Ezviz even when these ports are closed.

UPnP Disabled By Default In 5.5

Now, in firmware versions 5.5.0 and later, UPnP has been disabled by default:

UPnP is disabled by default. Hik-Connect platform would enable UPnP when camera is added and disable UPnP when camera is deleted from Hik-Connect platform. Upgrading would not change the UPnP configuration.

Those wishing to use UPnP must manually enable it in the camera's web interface or when prompted turn it on when adding to Hik-Connect (see below).

Not Disabled On Upgrade

Note that while UPnP is turned off by default, it is not disabled when upgrading firmware. This means that if users upgraded from a version older than 5.5, likely for the vast majority of Hikvision cameras older than a few months, UPnP will still be enabled unless users manually disabled it.

Enabled By Hik-Connect

The second way in which UPnP is enabled is with Hik-Connect, which directs users to enable 'port mapping' which uses UPnP (as shown in the red box below):

Despite Hik-Connect being their cloud service, Hikvision requires open ports for remote configuration.

UPnP = Security Hole

Because UPnP automates the port forwarding process and is turned on by default on many routers supplied by ISPs, users may simply not be aware their cameras are port forwarded to the internet and potentially vulnerable to attack (see Hikvision Backdoor Exploit). Further, even those who are aware they are turning port forwarding on may not be aware of what services are running, as not all ports are documented in the camera's web interface.

Future Vulnerabilities

Vulnerable devices connected to the internet eventually get hacked, this has been true since the internet gained broad popularity 20+ years ago. Sometimes these hacks are severe, for example to create botnets, as in the case of the Mirai botnet built on Dahua cameras, other times the hacks are less severe, but still cause harm or frustration to users. We anticipate seeing attacks against vulnerable Hikvision cameras escalate, as they make for a very broad and easy exploited target when shipped with UPnP Nat traversal enabled, and easily exploited backdoors that require little effort from hackers.

6 reports cite this report:

Hikvision HQ Contradicts Cybersecurity Director on Mar 07, 2018
Hikvision HQ has contradicted Hikvision USA's Director of Cybersecurity, Chuck Davis. Davis - Don't Put Cameras On The Internet Davis made a...
Remote Network Access for Video Surveillance Guide on Feb 21, 2018
Remotely accessing surveillance systems is key in 2018, with more and more users relying on mobile apps as their main way of operating the system....
IP Cameras Default Passwords Directory on Feb 09, 2018
Below is a directory of 50+ manufacturer's default passwords. Note: Change Default Passwords Leaving default passwords is dangerous and makes it...
Hacked Hikvision IP Camera Map USA And Europe on Jan 22, 2018
The interactive map below shows a sample of hacked and vulnerable Hikvision IP cameras across the USA and Europe. Hover over a marker to see an...
Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
Comments (22) : PRO Members only. Login. or Join.

Related Reports on Hacking

Hikvision FIPS 140-2 Cybersecurity Certification Examined on Aug 27, 2018
A week after the US government passed a law banning Hikvision, Hikvision announced it had obtained a FIPS 140-2 certification from the US...
Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...
July 2018 IP Networking Course on Jul 12, 2018
Registration is closed. This is the only networking course designed specifically for video surveillance professionals.  Lots of network training...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring (now US government banned) Dahua as a...
Debating Relevance of China Hacking US Navy Plans on Jun 11, 2018
"Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to...
Remove Dahua and Hikvision Gov Installs Required By US House Bill Ban on Jun 06, 2018
The final released US House Bill HR 5515 verifies that it not only prohibits the purchasing of Dahua and Hikvision products, it requires removing...
Dahua's Terrible Cybersecurity, Buys Credibility From PSA And SIA on Jun 04, 2018
Dahua has a terrible cybersecurity track record. But American organizations, like the Security Industry Association (SIA) and the PSA Security...
Canon Responds To IP Camera Hacks on May 30, 2018
Canon cameras made international news earlier this month, with reports of them being hacked in Japan (e.g., Hackers disable scores of Canon-made...
Corruption Alleged Against Hikvision Procurement In India on May 28, 2018
Over the past month, allegations of corruption and national security risk have made the news in India over the planned purchase of 150,000...

Most Recent Industry Reports

Avigilon Announces AI-Powered H5 Camera Development on Sep 19, 2018
Avigilon will be showcasing "next-generation AI" at next week's ASIS GSX. In an atypical move, the company is not actually releasing these...
Favorite Request-to-Exit (RTE) Manufacturers 2018 on Sep 19, 2018
Request To Exit devices like motion sensors and lock releasing push-buttons are a part of almost every access install, but who makes the equipment...
25% China Tariffs Finalized For 2019, 10% Start Now, Includes Select Video Surveillance on Sep 18, 2018
A surprise move: In July, when the most recent tariff round was first announced, the tariffs were only scheduled for 10%. However, now, the US...
Central Stations Face Off Against NFPA On Fire Monitoring on Sep 18, 2018
Central stations are facing off against the NFPA over what they call anti-competitive language in NFPA 72, the standard that covers fire alarms....
Chinese Government Praises Hikvision Following Xi Jinping on Sep 17, 2018
The Chinese government council responsible for managing China's state-owned companies praised Hikvision’s obedience to China’s authoritarian leader...
Amazon Ring Spotlight Cam Tested on Sep 17, 2018
Amazon's Ring has released their latest camera entry, the Spotlight Cam, which we bought and tested in our Consumer IP Camera Analytics...
European Mega Security Firm Verisure Pushing Security Fog on Sep 17, 2018
The European mega security firm Verisure (Securitas Direct), with a reported 2 million customers, is pushing security fog, as shown in this BBC...
IP Camera Cable Labeling Guide on Sep 14, 2018
Labeling cables can save a lot of money and headaches. While it is easy to overlook, taking time to label runs during installation significantly...
Favorite Intercom Manufacturers 2018 on Sep 14, 2018
Intercoms are certainly increasing in popularity, driven by the integration of video and IP networking. But who is the favorite? On the one side,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact