Hikvision Vulnerability Permits Wi-Fi Attack

By: Brian Karas, Published on Nov 28, 2017

Hikvision acknowledged a Wi-Fi cyber security vulnerability on November 27, 2017. No special passwords, text strings, or programming knowledge are required. Any attacker within Wi-Fi range of the impacted cameras can exploit this.

IPVM spoke with the researcher who discovered and reported this vulnerability. We examine the limitations, exploit potential, affected products, and Hikvision's problems in responding to the vulnerability.

Limited ****** *********

**** ************* ** ******* to Wi-Fi ******* ***** *** user *** *** ********** Wi-Fi ********, ********** *** Ethernet *******. **** ****** it ** * ********** small ****** ** ********** units, ** **-** *******, ** general *** *** **** popular, *** ***** ***** Wi-Fi ******* *** ****** to ********* **-**. 

Exploit ********

*** ************* ** **** ***** cameras *** ***, ** default, ** ******* * wireless ******* ****** "*******", with ** ********. ** ******** *** create a **** ******* **** **** "davinci" *** * ********** cameras **** ************* ******* to **, ******** *** attacker ** ******* ** the ******. ********* ** the **********, *** ********** camera **** ** ****** used * ** ******* chipset *** ** ******** that **** ** ****** the ****** ** *** vulnerability.

********* ****** **** *** following ***** *** ********:

**-**********-***, **-**********-***, **-**********-**, **-**********-**, **-********-***, DS-2CD2132F-IWS, **-*******-**, **-********-**

*** ********* ******* ***** an ******* ** *** an ******** *** *** the **-** ******* ****** with ******* ******** ** a *** ** **** access ** ** ******** network:

Firewalls ***********

******* *** ******** ******** over *** ****** **-** ******* interface ** *** ******, any ******** ********, ****, or ***** ******* **** to ****** ******** *********** on *** ******** **** of *** ******* ***** not ** ******* ** the Wi-Fi **** ** *** camera, ******* ** **** to ******.

Exploit *********

********** ** *** ********** (user ******) ** *********, **** ** ***** units ******* **** ******** that **** ******** ********* the Wi-Fi ********* **** *** being **** (** ** 5.4.5), *** **** *** ********** to *** ********* ******** *******, ****** *** ******* potential **** **** *** users ** ***** ******* with ******* **-** ********.

*** *********** *** *** attacker ** ** ** Wi-Fi ***** ** *** unit, *** **** *** unit **** **** ******* Wi-Fi ********, ***** **** vulnerability less ****** **** *********'* ******** *************. ** **, *******, * significant ********* ** *********'* part ** **** ******** with **** ******* ********. 

Hikvision ***** ******** ******* ************

***** ********* ********** *********** to ****** ***************, *** has * ******** ***** address *** ***** *******, response **** ******:

*** ********** ******* **** despite ********* *********'* ********, it **** * ******, and ******** ******* ******** to *** * ******** to **** **********, ***** as **** ** *** vulnerability ********** ****:

***** ******* ******* ******** came ***** ********* *** President ******* ** *** actively promoting*********'* ***** ******** *******, ********* ****** ** hiring ******** *** ******** penetration ******* [**** ** longer *********], ***** ****** have ********** **** ***** vulnerability ** ***** ***. ************, *********'* ***** *** **** of ***** ******** *** **** *** *******, leaving *** **** ** cybersecurity **** **** ****** the ******* ******* ********.

Positive ******** **** ***** *****

*** ********** ****** **** his ******** **** ********* ultimately **** **** *** cyber ******** **** ***** ***** [link ** ****** *********], whom ** ***** ** be ******* *** ******** interested ** ********** *** discovery. ** **** ***** was * **** **** for *********, *** ***** hopefully ** **** ** improve *********'* ******* ***** security ************** *** ************* management ******* *********** **** as ***** ******** ************** ******** *******

Hikvision ** ********* ************ ** *****

******* ************* *** ****** on ******* ***, *** having ******* ******** *********, as **** ** *********** workarounds ** ***** **** vulnerability, ********* *** *** proactive notify ***** ****** *** vulnerability *** ********* ******** by **** **********.

Special ******** ****** ***

********* *** *** ******* to ****'* ******* *** additional ****** ** *** vulnerability **********. *******, **** **** 3 ***** ***** *** ***** to *********, *** ******* released * "******* ********", reusing *** ******* **** and ***** **** **** their ******* ******** ******** 2 ***** *** ** the **** ****** ******* ********* Investigation.:

~** ******* *****, ********* re-sent *** ******** **** a corrected ******* **** *** intro:

** *** ********, ******* of ********** ******* ** the ************* *****, ********* starts ** ******* ***** they ****** ******* ****** features, ****** **** *** technically ********** **** *** firmware ********* ** **** ** the ******** *****.

** * ******* ******** ****** (***) ********* **** ********, users *** ******* ** is ** "*********** ****" document, **** ** ****** required:

***, *** *** ******* ******** action, ************ ******** ****** firmware ***/** ********* **-** (for ***** **** ******** new ****** ** ******* this).

***** *** "****** ********" section ***** ************* ** a ***** *****, *********'* errors ** ********* *** notifications ******** *** ******* rushed ** ***** ***** responses **** **** ****** aware **** *** ************* would ** ******** *********, and ******** **. *** Hikvision **** ********** ** their *** ************* ********* email *******, *** *** a ************* ******** *** notification ******* ** *****, they ***** **** *** their ****** ** ******* "education *** ********" ******* of ******* ** ******* to *** ********** *** issuing *******-******** *************.

Continued ********* *********** ******

**** ************* ** ** avoidable *****, **** ****** ** discovered ** ******** *********** processes ** ******** ***** security *****. *********,*********'* ****** *********** ******** in ************ ****** *************, *** *** ******** ******** *************, ***** ******, *** also ***** ** *************** that **** **** *** result ** **** ******** design ** **************, ** choices **** ** *** company ** ************ ***** security ******** ** ***** aspects ** *** ********. 

Communication ************ ******

********* ***** **** ****** significantly with *******, **** ********* and **** ********* ************* on ***************. 

Comments (15)

We are seeing the HIKVision mini PTZ DS-2DE2103-DE3/W and HIK DS-2DE3304W-DE hacked remotely (OSD names changed to HACKED) despite having a strong password.  Not sure if this is related to the same vulnerability.

HIKVision does not have firmware updates on their tech portal (xx3304xx not listed), or the website (404 broken link) or on their unofficial FTP site.  Tech support doesn't know, they just point you at the tech portal which does not have the camera listed.  The one they say should work doesn't work.

How can HIKVision expect us to protect end users from hacking when they do not even give us firmware??

This is absolutely insane.

Scott -

What are you describing sounds like the cameras are being hit by the Hikvision Backdoor Exploit, which allows someone to access or change camera settings regardless of the admin password strength/complexity. Basically, with this backdoor, Hikvision provides a way for attackers to circumvent strong passwords.

For what its worth, you are not alone. An analysis I did over the Thanksgiving weekend shows there are likely thousands of cameras that have had the name changed to "HACKED". Also, there are 10's of thousands of cameras with this vulnerability reachable on the internet. I have not determined how/why the ones that are being hacked to show "HACKED" are selected relative to the fairly large overall number of vulnerable cameras.

Here is a map of where I have located nearly 1,000 cameras (based on geo IP lookup, so some points could be off) showing "HACKED" for the camera name. You can see they are heavily concentrated in the US, and Europe:

Question:  If Hiks explosive growth over the last few years is primarily due to big deals within China (i.e. they have far more cameras installed in China than anywhere else), how come all the vulnerable cameras appear to be in N America and Europe?

These are not just vulnerable cameras, they are vulnerable cameras that have been hacked to display the English-language text "HACKED" (or "Hacked", or case-insensitive variants).

There may be cameras in China that display the Chinese equivalent of "HACKED", but my check was not looking for alternate languages/spellings, etc.

 

that makes sense...  : )

why so few in Australia then, do you think?

Because Shodan has very very few Hikvision devices in their database, as far as I can tell. 

very very few Australian devices?  or total devices?

my point is... if the reason Chinese Hik cameras don't show up on your search for devices reporting as HACKED (when there are more of them there than anywhere) is because your search was limited to the English version of the word HACKED, then why are there not more HACKED devices showing up in Australia?  Since I would assume most of their systems were based in English?

why are there not more HACKED devices showing up in Australia?

Because the shodan database has very few IPs for Hikvision cameras in Australia. I do not know if that is because Hikvision has low market penetration there, because Shodan simply does not scan IPs in Australia, if Australians have better firewalls, or something else. 

If the IPs are not in shodan, which is where I pull lists of publicly accessible cameras from, then I can not scan them.

 

Hi Brian,

you published an interactive map for USA.

Could you pls also publish some similar map for Europe?

 

BR,

Karsten

This may be farther reaching than you think because for a long time, to get sound “S” you had to get the WiFi version “W”. The models were often “IWS”. 

I know with near certainty the customers using them for audio never touched the WiFi default settings. 

Another Hikvision hack !!! What a shock.

Update: A day after IPVM criticized Hikvision for its notice that erroneously stated no action was required:

In a Product Advisory Notice (PAN) Hikvision also released, users are advised it is an "Information Only" document, with no action required:

Yet, the PAN clearly requires action, recommending updating device firmware and/or disabling Wi-Fi (for units with firmware new enough to support this).

Hikvision released a corrected notice:

Why should Hikvision worry about quality control and copy editing when you're willing to do it for them for free? 

The incompetence is maddening. 

Read this IPVM report for free.

This article is part of IPVM's 6,538 reports, 881 tests and is only available to members. To get a one-time preview of our work, enter your work email to access the full article.

Already a member? Login here | Join now

Related Reports

School District Admits Not Following FDA Guidelines With 144, No Blackbody, Hikvision Fever Cameras on Aug 21, 2020
The Baldwin County School District has admitted it is not following FDA...
Clinton Public View Monitor (PVM) Mask Detection Tested on Jul 09, 2020
Face mask detection, or more specifically not wearing one, is expanding...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Mobile Access Control Usage Statistics 2020 on Sep 21, 2020
Most smartphones can be used as access control credentials, but how...
Avigilon Social Distancing Analytics Tested on Aug 26, 2020
Avigilon released its social distancing analytics in response to the...
Avigilon Face Mask Detection Tested on Jun 24, 2020
Face mask detection or, more specifically not wearing a face mask, is an...
ProCam Low-Cost Open Thermal Temperature Project on May 12, 2020
An engineering professor in Switzerland is building what he hopes will be the...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
Dahua Critical Cloud Vulnerabilities on May 12, 2020
Dahua has acknowledged a series of cloud vulnerabilities that researcher...
Dangerous Hikvision Fever Camera Showcased by Chilean City on Aug 07, 2020
Deploying a fever camera outdoors, in the rain, with no black body, is...
Favorite Access Control Credentials 2020 on Sep 15, 2020
Credential choice is more debated than ever, with hacking risk for 125kHz and...
Avigilon ACC Cloud Tested on Jul 08, 2020
Avigilon merged Blue and ACC, adding VSaaS features to its on-premise VMS,...
Face Masks Increase Face Recognition Errors Says NIST on Aug 04, 2020
COVID-19 has led to widespread facemask use, which as IPVM testing has shown...
Remote Network Access for Video Surveillance Guide on Jul 27, 2020
Remotely accessing surveillance systems is key in 2020, with more and more...
IPConfigure Presents Orchid Fusion VSaaS on Apr 30, 2020
IPConfigure presented Orchid Fusion VSaaS at the April 2020 IPVM New Products...

Recent Reports

Hanwha AI Object Detection Tested on Sep 28, 2020
Hanwha has added detection and classification of people, cars, clothing...
Favorite Access Control Manufacturers 2020 on Sep 28, 2020
200+ Integrators told IPVM "What is your favorite access control management...
New Products Show Fall 2020 Starts Tomorrow! on Sep 27, 2020
Tomorrow, IPVM's sixth online show will feature New Products from over 25...
OnTech Smart Services Partners With Google and Amazon To Compete With Integrators on Sep 25, 2020
A pain point for many homeowners to use consumer security and surveillance is...
The Future of Metalens For Video Surveillance Cameras - MIT / UMass / Immervision on Sep 25, 2020
Panoramic cameras using 'fisheye' lens have become commonplace in video...
Hikvision Sues Over Brazilian Airport Loss on Sep 24, 2020
Hikvision was excluded from a Brazilian airport project because it is owned...
China General Chamber of Commerce Calls Out US Politics on Sep 24, 2020
While US-China relations are at an all-time low, optimism about relations...
Verkada Disruptive Embedded Live Help on Sep 24, 2020
Call up your integrator? Have someone come by the next day? Verkada is...
IP Networking Course Fall 2020 - Last Chance - Register Now on Sep 23, 2020
Today is the last chance to register for the only IP networking course...
Drain Wire For Access Control Reader Tutorial on Sep 23, 2020
An easy-to-miss cabling specification plays a key role in access control, yet...
Norway Council of Ethics Finds Hikvision Human Rights Abuses "Ongoing" on Sep 23, 2020
Hikvision's involvement in "serious human rights abuse" in Xinjiang is...
IPVM Camera Calculator User Manual / Guide on Sep 23, 2020
Learn how to use the IPVM Camera Calculator (updated for Version 3.1). The...
Installation Course Fall 2020 - Save $50 - Last Chance on Sep 22, 2020
This is a unique installation course in a market where little practical...
SimpliSafe Business Security Launched Examined on Sep 22, 2020
SimpliSafe has launched "SimpliSafe Business Security" that the company...
FLIR CEO: Many New Fever Entrants "Making Claims That The Science Just Won't Support" on Sep 22, 2020
FLIR's CEO joins a growing number calling out risks with fever / screening...