Hikvision UPnP Hacking Risk

Author: IPVM Team, Published on Dec 04, 2017

Hikvision IP cameras are being hacked even for end users who had not set up port forwarding and believed their cameras were 'safe' behind firewalls.

The problem is UPnP and, more specifically, how Hikvision has insecurely used UPnP over the years.

In this note, we look at the security risks of Hikvision's UPnP practices, steps they have taken to reduce it and vulnerabilities that sill remain.

Examples

Over the past few months, numerous confused and concerned users have found their Hikvision IP cameras hacked. The most common reported case is the camera being labeled 'HACKED':

In other cases, cameras are reset to factory defaults, as described by an integrator in an IPVM discussion:

What puzzles some of these users is that they know the risks of exposing their cameras to the public Internet, and contrary to Hivision's recommendation to port forward, they have not explicitly granted access to those cameras, which in their mind should keep them safe from external attack.

Vulnerability: UPnP NAT Traversal

Get Video Surveillance News In Your Inbox
Get Video Surveillance News In Your Inbox

As the integrator in the above-referenced discussion found out, after spending considerable time and effort troubleshooting, Hikvision had enabled UPnP Nat Traversal by default, as he explained:

Hikvision cameras enabled UPnP NAT traversal, automatically creating their own firewall rules to grant outside access until the May 2017, 5.4.5 firmware. This is a vulnerability of its own and combined with the Hikvision backdoor, it allows full control to anyone across the public Internet. Enabling UPnP NAT traversal by default, and combining it with an easily-exploited backdoor set these cameras up for attack. Attackers have recognized this, leading to large numbers of Hikvision cameras being altered to show "HACKED" text on the video feeds or being disabled entirely by having their configuration wiped out, or put into a reboot loop.

Failed To Explain UPnP Risk

Hikvision's poor communication on the 'privilege escalation' backdoor failed to explain the risks of UPnP. Indeed, Hikvision suggested the opposite that IP cameras should be safe behind other devices:

The overwhelming majority of Hikvision cameras are accessed through a connected NVR, Hikvision iVMS software, or third-party VMS software. As such, it limits the possibility for Hikvision IP cameras to be open to public access, lowering the risk of the cybersecurity exposure. To date, Hikvision is not aware of any reports of malicious activity associated with this vulnerability. [emphasis added]

Of course, now there are widespread reports of malicious activity, facilitated in many case by Hikvision's UPnP tactic and their failure to communicate these risks.

UPnP Enabled Firmware 5.4.0 And Earlier

In firmwares prior to 5.4.5, UPnP was enabled by default, with the camera's web interface showing three ports being forwarded for HTTP, RTSP, and "Server Port" (command/control data).

However, while the menu above shows only three ports, when actually enabling UPnP on a router, five ports were actually forwarded: the three above as well as 9010 and 9020, described as "IPC_CIVIL_CMD" and "IPC_CIVIL_STREAM."

A Hikvision bulletin describes these ports as used for Ezviz (Hik-Connect) Command and Live View, but live view is still possible via Hik-Connect/Ezviz even when these ports are closed.

UPnP Disabled By Default In 5.5

Now, in firmware versions 5.5.0 and later, UPnP has been disabled by default:

UPnP is disabled by default. Hik-Connect platform would enable UPnP when camera is added and disable UPnP when camera is deleted from Hik-Connect platform. Upgrading would not change the UPnP configuration.

Those wishing to use UPnP must manually enable it in the camera's web interface or when prompted turn it on when adding to Hik-Connect (see below).

Not Disabled On Upgrade

Note that while UPnP is turned off by default, it is not disabled when upgrading firmware. This means that if users upgraded from a version older than 5.5, likely for the vast majority of Hikvision cameras older than a few months, UPnP will still be enabled unless users manually disabled it.

Enabled By Hik-Connect

The second way in which UPnP is enabled is with Hik-Connect, which directs users to enable 'port mapping' which uses UPnP (as shown in the red box below):

Despite Hik-Connect being their cloud service, Hikvision requires open ports for remote configuration.

UPnP = Security Hole

Because UPnP automates the port forwarding process and is turned on by default on many routers supplied by ISPs, users may simply not be aware their cameras are port forwarded to the internet and potentially vulnerable to attack (see Hikvision Backdoor Exploit). Further, even those who are aware they are turning port forwarding on may not be aware of what services are running, as not all ports are documented in the camera's web interface.

Future Vulnerabilities

Vulnerable devices connected to the internet eventually get hacked, this has been true since the internet gained broad popularity 20+ years ago. Sometimes these hacks are severe, for example to create botnets, as in the case of the Mirai botnet built on Dahua cameras, other times the hacks are less severe, but still cause harm or frustration to users. We anticipate seeing attacks against vulnerable Hikvision cameras escalate, as they make for a very broad and easy exploited target when shipped with UPnP Nat traversal enabled, and easily exploited backdoors that require little effort from hackers.

6 reports cite this report:

Hikvision HQ Contradicts Cybersecurity Director on Mar 07, 2018
Hikvision HQ has contradicted Hikvision USA's Director of Cybersecurity, Chuck Davis. Davis - Don't Put Cameras On The Internet Davis made a...
Remote Network Access for Video Surveillance Guide on Feb 21, 2018
Remotely accessing surveillance systems is key in 2019, with more and more users relying on mobile apps as their main way of operating the system....
IP Cameras Default Passwords Directory on Feb 09, 2018
Below is a directory of 50+ manufacturer's default passwords. Note: Change Default Passwords Leaving default passwords is dangerous and makes it...
Hacked Hikvision IP Camera Map USA And Europe on Jan 22, 2018
The interactive map below shows a sample of hacked and vulnerable Hikvision IP cameras across the USA and Europe. Hover over a marker to see an...
Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
Comments (22) : PRO Members only. Login. or Join.

Related Reports on Hacking

Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Hikvision Favorability Results 2019 on Mar 18, 2019
Hikvision favorability results declined significantly in IPVM's 2019 study of 200+ integrators. While in 2017 Hikvision's favorability was...
Spring 2019 IP Networking Course on Jan 10, 2019
You can register for the Spring 2019 IP Networking course here. This is the only networking course designed specifically for video surveillance...
Bosch VDOO 2018 Vulnerability on Dec 20, 2018
Security research firm VDOO has discovered a critical vulnerability in Bosch IP cameras. Inside, we cover the available details of this new...
Genetec UL Cybersecurity Certificate (2900-2-3) Examined on Dec 19, 2018
Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates? Earlier in 2018, a...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...

Most Recent Industry Reports

IBM / Genetec Surveillance System Investigated Over Philippines Human Rights Abuses on Mar 22, 2019
A lengthy investigation into an IBM video surveillance project in the Philippines, raising concerns IBM helped local police conduct a bloody...
Eagle Eye Favorability Results 2019 on Mar 21, 2019
Eagle Eye has been the biggest spender in the cloud VMS market including (via their owner) acquiring Brivo for $50 million and CameraManager from...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Covert IP Camera Shootout - Axis, Hanwha, Hikvision, March, Vivotek on Mar 20, 2019
Covert cameras were one of the last holdout areas for analog cameras. However, in the past few years, IP / HD covert cameras have become...
Top Metrics For Ensuring Integrator Profitability - Statistics on Mar 20, 2019
How do integrators ensure the profitability of their projects? As part of our profitability study, 100+ integrators answered the following...
Avigilon Launches 'Renewed Products Program' on Mar 19, 2019
There are lots of 'pre-owned' cars but pre-owned IP cameras? While such programs are common in other industries, in video surveillance, they are...
Hanwha Tax Evasion Probe, Camera Division Implicated on Mar 19, 2019
A Hanwha group subsidiary was raided as part of a tax evasion probe. While a Korean news media report listed the raided entity as 'Hanwha...
Genetec Security Center 5.8 Tested on Mar 19, 2019
Genetec has released Version 5.8. This comes after a wait of more than a year that caused frustrations for many Genetec partners. Our previous...
Retired Mercury President Returns As Open Options President on Mar 18, 2019
Open Options experienced major changes in 2018, including being acquired by ACRE and losing its President and General Manager, John Berman who...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact