Hikvision Hik-Connect 5 App / JWT Vulnerabilities Analyzed

bm
bashis mcw
Published May 22, 2023 14:17 PM

IPVM discovered a critical vulnerability in the Hikvision Hik-Connect cloud that allowed unauthorized access to Hik-Connect user's accounts by simply listening on network traffic for logs sent unencrypted from the Hik-Connect app to the Hikvision cloud that included sensitive information such as critical authorization tokens.

IPVM Image

Within this report, based on IPVM network traffic analysis, we provide a detailed description of the discovered vulnerability, insight into the video encryption password, and demonstrate forged requests to Hikvision Cloud, resulting in the sharing of the victim's camera with the attacker.

Furthermore, see the report Hik-Connect 5 App/Cloud Cybersecurity Tested, which led to the discovery of this vulnerability and includes other cybersecurity aspects.

Executive *******

**** ********** * ******** ************* ** Hikvision's ***-******* ***** ************* **** ******** in *** *** ******* *********** **** from *** ***-******* *** ** *** Hik-Connect *****. **** ******* ** ******** to *********** * ********** **** ******* their ********* *** ******* ******** ** their ****** ***** *** ********* ***** services.

**** ******** ******* ******* ******* *** app *** *** *****, ******* **** these *** ****** ******* *** ****'* JSON *** ***** (***) **** ** "user_login, **************, **********, **********". **** ******** data ** ********* ** *** ***-******* application *** **** *********** ** *********. The **** *** **** ******* **********, as **** *** *********** ***** **** instead ** *****, ***** ** ************ concerning **** ***** ****** **-** ********.

**** ************ **** ************* ** ******* a ****** **** * ****** *******, detailing *** ***** *** ***** ********** password ********, ***** *** ****** ** Hikvision *****.

The ********* ***-******* *************

******* *** ************ ** ******* ******* sent **** *** ***-******* *** *** filtering *** ********* ******* ** *********** show **** *******, ** ***** ******* unencrypted *** ************ ******* ******** ** the ***-******* *****.

IPVM Image

*** ******* ** ********** ** *** log ************ ** *** ***-******* ***** made ** ********** ** ************ ******* network ******* **********. ******** *** **** JSON *** ***** (***) *** *** always ******** ** ***-******* ****, **** could ** ***** **** "****************", **** **:

  • **********
  • **************
  • **********
  • **********

*** **** *** ***** (***) ** the ****-********** **** **** ***** ** easily ******** ** ********* *** *** JSON **** "*********" ** "*******", ** ************ *****.

IPVM Image

JSON *** ***** (***) *******

***** * **** **** ** ** the ***-******* ***, ***** ********** ******* will ******* *** ***. **** ****** the **** ** ****** ******, ********, and ********* ****** ********* ***** ********** by *** *****.

********** *********** ***** *** **** *** Token (***) **** ** *** ***-******* app *** ** ******** ********** ** *** ***.**. **** ******** ******* **** ** user **, ******** ****, ***** ****, and ****** ****. ***** ** *** information ******* **** *** ***.

IPVM Image

** ***'** ********** ** ******* **** knowledge ***** **** *** ****** (****),***.** ****** * **** **** *********** introductory ****.

IP ****** ******* ****** ********

*** ****** ******** ******** * ******* approach ** *** ********, *** ******* to ******* ******* ******* ******** ********. For ******* ** ****** **-** ********, where *** ****** ** ******** ***** intercepting *** ******** **** *** ***** (JWT).

** *********** *** *** ******* ********* Hik-Connect **** *** ***** (***) **** someone **********, **** **** ******** * scenario ***** *** ******'* *** *** already **** ***********.

******* *** *** ** **** ***** repeater *************, **** **** ******** **** how ** ******** ***** ******** ******** on ****** ** *** ****** ******* their ********* *** **** ***** ****** to ***** ******* **** *** ********'* Hik-Connect *******.

*** ******'* ***-******* *** ****** ****** sharing.

IPVM Image

** ******** ***** *** ***** *********, the ********* ***-******* ***** ******** *** JSON *** ***** (***) ***** ** the "*********"** *** **** *******.

*** ******** ***** **** ***** *** victim's ********* ****** **** ***** ******* using *** ******'* ****** ******, ***** was **** ************ ** *** *********** logs *** ********* ***** ** ** linked ** *** ******, *** **** share *** ****** **** *** ********'* account ***** *** ********'* ***** *******.

IPVM Image

***** ********* ***-******* ***** ******* **** the ******* ** ********** *** ********* by *** ******, ** ************ ** confirmation ******* *** **** ** *** victim ********* *** ****** ****** **** the ********'* *******.

*******, *** ****** ***** ***** ****** see **** *** ****** ** ******.

IPVM Image

** ******** ********* *** "******* *******", *** ****** ***** **** **** the ********'* ******* ***** ******* *** the ******* **** **** **** ****** with ****.

IPVM Image

**** ******* *** ****** *******, *** attacker **** ******* * ************ ** new *******.

IPVM Image

*** ******** **** ***** ** ***** on "**** ***" *** **** "******".

IPVM Image

**** *** ******** ****** ** "******", *** ******** ***** ****** ** the ***** *** ***** ******** ** the ******'* ******.

IPVM Image

Hikvision ***** *** ***** ********** ******** *******

* ******* *********** ************* ******** *********** whether *** ***** *** ***** ********** password *** **** ** *** ********* Hik-Connect *****.

*** ******** ** *** ******** ******** that *** ******** **, ** ****, stored ** *** ********* ***-******* *****, and ** **** ********* ** **** matter *****.

** **** ****** * *** ******** within *** ********* ****** *** ******* a ******* ** *** ******** *** viewing ********.

IPVM Image

**** *** ******** **** *** ***** (JWT), ** **** *** ********** ** utilize **** *****'* ******** ******** ** submit * ******* **** ******** *** type ** **** ****** ** *** account *** *** ******** ******** ** the ********* ***-******* *****.

********** **** ************* ** ********* ** the **** *** "*********", ******** ** ***** *** ********* its *******, ** ***** **** *** key ********* *** ******** ********* **** after ********** * ******* ***** ** the ****** *** ****** *** ****** to ******* ***-******* *******.

*** ***** **** ** ** *** JSON *** "**********," ***** ** * **** ************** of *** ********.

IPVM Image

** *** ********* **** ***** *******, we **** ****** *** ***** ********** password **** *** *** ******** "************" ** *** *** "***********."

IPVM Image

**** ** ******* *** ******* *** more **** ** ******** *** **** related ** *** *******, ** ******* a ****** ** *** **** *****.

IPVM Image

*** **** ** ***, ***** ******** two ********** *** **** ************ ** the ********. **** **** *** ** easily ********, ** *********** *****.

IPVM Image

** * ****** ** **** ******, when *** ****** ******* ** ****** the **** *****, *** ***-******* *** will ****** *** *** *** ********** password ***** *** ****** ******** ** longer *******.

IPVM Image

** ******, ***** **** **** ***********, we ***** ******* *** ********* **** against * ******** ** ******* ***** twice **** *** ** ********** * brute-force****** **** *******.*** *********** **** ********* ** *** camera ** ******** ** *********** **** we **** ** **** ****.

*** ******** **** ** ******* * - ** **********, ** * *********** of ********* *** ********* ******* *** digits.

** ********,***** ** **** **********, ***** ***** *** **** ******** from ******* (* **********) ** ** several ***** (** **********), ********* ** the **** **** ** *** ******** being ****.

Versions ****

  • **-*********-**: **.*.** ***** ******
  • ********* ***-*******
    • ********* *** *****: *.*.*.****
    • ****** **** *****: *.*.*.****
Comments