Network Security Audit App (March Networks) Examined

Author: Brian Karas, Published on Dec 01, 2016

Verifying one's video surveillance devices are locked down against common cybersecurity vulnerabilities is increasing important, as hacks using video surveillance have become more prominent.

March Networks has released an enhanced mobile app to audit these issues.

Can you verify your recorder is locked down against common cybersecurity exploits?

In this note, we examine the app, and identify what it checks, and what it overlooks, when it comes to enhancing the network security of their products.

********* ***'* ***** ************ ******* *** ****** **** ******* ****** cybersecurity *************** ** ********** *********, ** ***** ***** ***** ************ have ****** **** *********.

***** ******** *** ******** ** ******** ****** *** ** ***** these ******.

*** *** ****** **** ******** ** ****** **** ******* ****** cybersecurity ********?

** **** ****, ** ******* *** ***, *** ******** **** it ******, *** **** ** *********, **** ** ***** ** enhancing *** ******* ******** ** ***** ********.

[***************]

GURU *** ********

*****'* **** ***** ******** ** ** * ******* ******* **** ****, ****** towards ********** *** *********** **** **** ***-*****. ***** *** *** documentation *** *************** **** **** *** ***, ****** * ******* ticket, ** *** ** ** ******* * ******* *** ** necessary. *** *** ***** ** ** ** *** **** *** as *** ********, ***** ** ******* **** ** ******** * wifi ****** **** *** ******** ** ****** * ***** **** hotspot *** *** ***** ******* *** *** ** ******* **.

* ********* ***** **** ***** ******** **** **** *** ******* app ********* *** *********:

Security ***** *************

***** ********* * ******** ***** ********** ** ****** ** ****, ***** ******** * ***** ****** check, ******* ** *** ******** **** **:

  • ***** *** ***-******* ***** ********
  • ***** *** ***-******* ****** ********** *****
  • ***** **** *** **** ** ****** (*** ** ********* ******* temporarily *** ************ *** ********)
  • ***** **** **** ** ********
  • ***** *** *** **** **** ** *****

*** *** ******** ****/*******/*** ****** *** ******* **********, ********* ** what ** *****. ***** *** **** ****** * *** ****** to ***** ***,**** ** * ****** *** ** ** ***** *****.

Limitations ** ***** ***

*** **** ******** ***** **** *** ******* *** ****** ***** on *** ********, ** ****** ****** ** *** ******** ** report *** *************. *** ********* **** **** *** ******* ** detect ******* **** ***** ** ****** *** ******* ** ****** back ** *** ***. **** ***** **** * ******** ***** pass *** ***** ***** *****, *** ***** ** ******* **** form ** ****** ********, ** ******** ********* **** *** ** an ******** ******. ** ******, *** ******* ** * ******** being ****** ** *** *************** *** ******** *** ***** *****, it ** ********* ** **** **** * **** "****" **** the *** **** *** **** *** ****** ** ********** ****** to *******, *** ** **** ******** **** ** ** ** least *** ** **** ******.

******* *** *** *** **** ** **** ** * ***** network, *********** *** *** *** **** ** ************ ***** ** on ********* *** ********* ** ****** **** ** ******* ******** settings **** **** ******* ** ****** ******** *****.

Good ***** ****

**** **** *** *********** ***** *****, **** ** ***** * good **** ** *****'* **** ** **** *********** ****** ******, and ******, ***** *********. ** ***** *** *** *** ******** to ******* **** ******, **** ** * ******** ********* ***** to ****** **** ** ***** ******** *** **** ********* ** the ********, *** ***** *** ********* ** ** **** **** will *********** **** ******** **** ****** ******** *** ************.

What ***** ***** ************* **?

**** ******** ************ *** ******** ** ***** ************. **** ********* enhancements ***** **** **** ***** *******:

  • **** ****-**** ** ******** ****** ***** *** ****** *** ***** for ***** **** ***** **** *** ** **** ***************
  • ******-***** ********** ** ***** **** ****** ***** *** ****** *** also ******* ****** ********* *****
  • ******** (*** ********** *******) ********** ******** **** **** *** **** used ** **/**/** ****

*** **** *********** ** *** ******** ***** *** ***** **** app ************.

Comments (2)

It would be nice to have a universal tool to scan networks to see if default user/passwords are used on a customers IP camera network. Basically the Mirai virus minus the malicious part.

...GURU security audit does not perform any direct tests on the recorder, it simply relies on the recorder to report its configuration

So this is for March equipment only? Too bad.

If its propreitery and they are going to take the recorder's word for it, why not have the nvr email you in the event that the status goes to BAD?

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Most Recent Industry Reports

Access Control Course Spring 2019 - Last Chance on Apr 19, 2019
This is the last chance to register for the Spring Access Control Course. IPVM offers the most comprehensive access control course in the...
Riser vs Plenum Cabling Explained on Apr 18, 2019
You could be spending twice as much for cable as you need. The difference between 'plenum' rated cable and 'riser' rated cable is subtle, but the...
Verint Victimized By Ransomware on Apr 18, 2019
Verint, which is best known in the physical security industry for video surveillance but has built a sizeable cybersecurity business as well, was...
Milestone Drops IFSEC on Apr 18, 2019
Milestone has dropped out of Europe's largest annual security trade show (IFSEC 2019), telling IPVM that they "have found that IFSEC in EMEA no...
The Fastest Growing Video Surveillance Sales Organization Ever - Verkada on Apr 17, 2019
Verkada has the fastest growing video surveillance sales organization ever. In less than 2 years, they already have more salespeople in the US...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Securadyne CEO: IPVM 'Entertaining For An Ignorant Few' on Apr 16, 2019
Securadyne's CEO Carey Boethel is unhappy with IPVM's report - Failed Integrator Rollup, Securadyne Sells to Guard Giant Allied. Indeed, he...
Dahua Repositionable IR Multi-Imager Camera Tested on Apr 16, 2019
Dahua has released their first repositionable multi-imager camera, the Multi-Flex 4x2MP, claiming integrated IR, true WDR, and flexible...
Strong ISC West 2019 For Manufacturers But Concerns For 2020 March Move on Apr 16, 2019
ISC West 2019 was strong for manufacturers, according to new IPVM survey results of 100+ manufacturers, consistent with 2018 results. However,...
Axis Supports HD Analog on Apr 15, 2019
In 2017, Axis declared 'Everything is IP': Now, in 2019, Axis has released support for HD analog, with their new encoders.  Why the change?...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact