Hikvision Critical Cloud Vulnerability Disclosed

Author: IPVM Team, Published on Apr 25, 2018

Security researchers Vangelis Stykas and George Lavdanis discovered a vulnerability in Hikvision's HikConnect cloud service that:

just by knowing the email,phone or username they used while registering, after that you can view the live feed of the cam/DVR, manipulate the DVR, change that user’s email/phone and password and effectively lock the user out

The researchers detail the process and the issues in this post. Hikvision HQ has acknowledged the vulnerability and released a fix.

Inside this note, we examine what the issue was, compare it to 2017's Hikvision IP Camera backdoor and explain why this one was a coding error and not anything to do with Hikvision's Chinese government ownership.

******** ******************* *************** ****************** * ************* ** *********'* ********** ***** ******* ****:

**** ** ******* *** *****,***** ** ******** **** **** ***** registering, ***** **** *** *** **** *** **** **** ** the ***/***, ********** *** ***, ****** **** ****’* *****/***** *** password *** *********** **** *** **** ***

************** ****** *** ******* *** *** ****** ** **** ****. ********* ** *************** *** ************* *** ******** * ***.

****** **** ****, ** ******* **** *** ***** ***, ******* it ******'* ********* ** ****** *********** ******* *** **** *** *** * ****** ***** *** not ******** ** ** *************'* ******* ********** *********.

[***************]

HikConnect **********

********** ** *********'* ****** ***** **********/****** *******. ** *** ******* for * ****** ** *****, ***** ** ***** ** *****, and ***** ***** ******** ************* *** ***** ** ***** ********* **** ******************* ************ *********, ********* *** **** ********* **********.

**** **********, * ****** ********** ** **** **** ***'* ********* devices (*********, *******, ***.) ** *********'* ***** *******. ** ** so, *** ******* * ********** *******. **** ****, *** ********* device ** ******** ********** ***** *** ***** *******.

Vulnerability *********

*** ************* ** ******** ***** ** ****** **** ****** ** devices ********* ** **********. *** *********** ***** * *** ******:

(*) **** **** **** ** ****** * ****** **** **** were *** ****** ** ** ** ******** *** **** ** on *** ****** *** ***** *******, ** **** ****:

***** ******** *** *** **** ** **** *** ***** ***** userid ** *** ****** ***** ** ********* ***…****, ** *** see *** ***** *******.

(*) ***** *****'* '******' ******* **** **** **** ** ***** their "***** ** *****" ** *** *** **** ** *** then ****** *** ******:

** ***** **** ***** *** **** * **** ** * friend *** *** ***** *** *** *** *** * ******* which **** *** *** (******) **** **!

**** **** *** **** **** **, **** ***** ****** ** step (*) *** ****** **** ******** ******'* ******.

3 *** ***

*** ********** **** **** ********* ***** *** ************* ****** * days ** **** ******* ********* *** ************* ******. ********* **** they *** "*** ***** ** *** ****** ** ********* ***" of *** *************.

***** ********* *** *** ******* *** **** ***** **, ****** explained ** **** **** ***** ********* *** *************, *** ******** guess ** **** **** *** ******** *** ****** ****** ****, rather **** ****** ******** *** **** ** ** ** ********.

Not ******* ********** *******

***** ***** *** *********** ******** ***** *********'* ******* ********** *********, this ** ********* *** * ****** ** ****. ***** **** is * ***** *******, ********* *** **** ****** ** *** account *** *** ****** *********. ** **** **** ** ****** those *******, **** ** *** **** *** '********', **** ****** can ****** ********. **** ** *** ****** ** *********, ** that ** * *********** ****** ******** ** ***** ******** (******* Hotmail ** *********). *******, ***** *** *******'* **********'* *********, *** concerns *** **** ***********.

Compared ** **** ********

*******-**** *********** ***** ** **************, ** **** ** ******** ****** ***** access ** ******* **** * ****** ******* ******. **** *************, by ********, ******** ********* ******. ** *** ***** ****, *** backdoor ******** ****** ******* ****** ** *** ****** (***** ** the ****** *** *** ******* ** *** ******** ***** ** limited). **** **********, *** ************* *** ** ******** ****** *** device *********.

Risks ** ***** ********

************, ************ ************* **** *********** **** **********, ***** *** *** significant ******** ** ****** ******* ******* ** ****** *******. ***** services *** **** ****** ****, ** *** ****** **** **** replace **** ********** (******, ****,********* ********* ** ********* **** ***************** ********** **** **********'* ***********/*****).

*******, ** **** ******** *****, ***** ******** **** ***** *** risks, ** ******** * ****** ***** ** ******* / *************. Instead ** ****** ******* ** ********* ****** *** *****, ** attacker ***** *********** *** ******* ** * ****** ****** *** get ****** ** ******** ** ********* ** *******. ****** *** Lavdanis *** ***** *** *********** *** *********** ******** ****. ****** could ** ***** *** ***** **** ************* *** **** ** to ******* *******.

Comments (12)

**** *******, * ****** ********* ********* *** ***** *** **** time.

******* ********:

*** ******* ****:

*********, *****'* ****** ** ************ *** **** *******.

** * *** ******** ****** *** * *** ********* **** is *** **** ** ******** *****? ***** ****** **** *** a *** ***** *** ****.

**. *** ** "****".

:)

***** ** ** **** ***** *** ******** *** * ************* in *****, **** ** **** ********* *** ******** *** **** matter.

* **** *** **** **** **** ***.

*** ******* ********** *** "******" ******* ** * ***** ***, not *********.

***, *** ***'* *******'* ******* ** *********.

** ******** ******* *** ****** **** **** ***** **** *** incorrect *******/******** **** ****:

**** ***** ********* ** **.

****** *** **** ***** ********* ****? ***** **** **** * deliberate ********** ****** ** ***********, **’* **** ** *** ** be **** ** *******.

***,

**** ** ******** ******* **** ** / ** *** ******, see *****:

*****, * ***** **** ****** *** ** *** **** **** did *** ** ********** * **** ******* ****.

** *** ***** ****, ** *** **********, ***** *** ****** of ********* ******* **** **** ****** *** ******* '******' ** it ** *** ** ** *** *********** ***** *** *****, just *** ******* **** ****.

* ***’* ******** ****, *** ******* **** ** ******* ** and ******* ** ** ********** *** **** ****** ** **** to ******* *** **.

** ** ****** ** ***** ** ********** ****** *******, ** a ********** ***************** - *** ****** *** ** ** * wrong *** ******** *** ********* ****** ** ****** ********* ** the ****** ******* ***** **** *** ***** **** *** *********, aside **** ***** ********, ** **** ********* *************.

*** *** ******** ** ******* ********** ** ******* *** ******* articles, *** **** **** **** ******* ******* *** ************ ***** ignorance *** *********. ** *** ** ** ****, * **** - **** **** ********* *** ********* ********* ** ****** ********** and ********** ******* - *** *** ****** ** ******* **, thus ******* ***** ********* ******. *** *** - ***’* ***** Hikvision ******* **’* ********* ***** ***** *** **** ** *** Chinese *********.

** **** ********* **** **** ***** ***** ******* ** *** name ** “***********” ********** - *** *** *** ** *** over *****......

**** ****!

******** *** ******** *** ******* **** ***** *******, *'* **** you **** **** ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Winter 2019 IP Networking Course on Dec 18, 2018
[Tomorrow, Thursday Dec. 20th is the last day to save $50] This is the only networking course designed specifically for video surveillance...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
Hikvision FIPS 140-2 Cybersecurity Certification Examined on Aug 27, 2018
A week after the US government passed a law banning Hikvision, Hikvision announced it had obtained a FIPS 140-2 certification from the US...
Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring (now US government banned) Dahua as a...

Most Recent Industry Reports

Dahua USA Sales Team Cuts - 'Strategic Right Sizing' on Dec 18, 2018
Dahua USA finishes a tumultuous year in which it acquired the Flir SMB business, was subject to the US government ban, terminated and restructured...
This Brooklyn Storefont Sells Millions In Uniview And Hikvision on Dec 18, 2018
Looking at their Brooklyn headquarters for this "CCTV Manufacturer", it is not much: Inside, it is not better: However, this company is one...
ACRE-Acquired Open Options Access Company Profile on Dec 17, 2018
Who is the company ACRE is acquiring? In this note, we examine Open Options line for best customer fit, key features, pricing, and main...
Open Options Acquired By ACRE on Dec 17, 2018
ACRE is doing deals again. A year after they sold Mercury, they are buying another access control company - Open Options. In this note, we...
8MP / 4K Fixed Lens Camera Shootout - Dahua, Hikvision, TVT, Uniview on Dec 17, 2018
8MP / 4K fixed lens models are now common in lower cost lines, with nearly every Chinese brand and their OEMs now offering multiple options. To...
Network Cable Shootout - Belden, Commscope, Hikvision, Honeywell, NavePoint CCA, Windy City Wire on Dec 17, 2018
Every IP camera install needs UTP cabling. But how much of a difference is there between dirt cheap generic cables found online and the bigger,...
Hikvision Government Parent Holds Communist Party Congress on Dec 17, 2018
The Communist Party committee of Hikvision’s government parent, CETHIK, held a Party Congress earlier this month where senior executives, including...
Imperial Capital Security Investor Conference 2018 Review - ADT, Resideo, Alarm.com, Arlo, Eagle Eye, ACRE, More on Dec 14, 2018
Imperial Capital Security Investor Conference is an event matching industry executives with financiers that frequently leads to future funding...
Cisco Meraki New Cameras and AI Analytics on Dec 14, 2018
Meraki has released their second generation of video surveillance with 3 new cameras, AI-based video analytics, and 2 cloud-based storage...
Foolish Strategy: OEMing Facial Recognition on Dec 13, 2018
Almost as 'hot' as face recognition marketing right now is OEMing facial recognition. Last year, they were a who's who of company's with...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact