Interview With Researcher Who Cracked Security Of 70+ DVR Brands

By: Brian Karas, Published on Jul 07, 2016

[link no longer available]The researcher who found an exploit in 70+ brands of TVT OEM DVRs, which he suspected to be the entry point hackers used to gain access to several retailers, elaborated on these hacks to us.

We got in touch with Rotem Kerner [link no longer available], previously a security researcher at RSA, and now co-founder of security research company Cybewrite to discuss the exploitability of embedded security devices.  

[**** ** ****** *********]*** researcher who found** ******* ** **+ brands ** *** *** DVRs, ***** ** ********* ** ** the ***** ***** ******* used ** **** ****** to ******* *********, ********** on ***** ***** ** us.

** *** ** ***** with Rotem ****** [**** ** longer *********], ********** * ******** researcher ** ***, *** *** co-founder ** ******** ******** ******* ********* ** ******* *** ************** of ******** ******** *******.  

[***************]

Old **** ******* *** * ***** ******

****** **** **** ** feels ************* ** ******** devices **** ********* "****** on *** **** **** not * *** ** people *** ****** ** hack ****". ******** ** other ******** ******* **** print ******* ** ***** *******, ******** cameras *** ********* *** not **** ****** ** many ***** ********, *** accessible ** ********, ****** manufacturers **** ********* ***** their ********.  

Now ****** ********

*** ******* ******* *** exploitable *******, ******** ******* were low-value *******, ** ***** up ***** *** **** few *****. **** *** massive **** ** ** camera ******* *** ********* deployment ** ********-********* ******* they have ****** *********, *** easy, *******.

Worse ** ***** ******* ** ********

** ***** ******* ***** rely ** *** **** core ****** *** ******** http ******* *** ************* *** management.  **** *** **** vulnerabilities ***** ** *** device *********** ********** ** other ******/******** ***** *** same ******** ******** *********.  Another ****** ************* ****** showed ******* ******* ** ******** device ****** *** ******* common ********.

How *************** *** *****

***** ***** ****** ** downloading ******** ******, *** using ***** **** ******* ** ********* **** *** look ** *** *** ***** in *** ********.  **** runs ******** ** *** ************ ********** of scanning * ****** ************ for **** ***** *** trying ******** ******* **** *** ********** ** *** ************.    

********* ** **** ** the *** *****, ************* *** ******** files ********, **** ********* a ********* **** ** brands/logos.  **** ******* *** to *********** ********* **** the ******* ** ******* could ** ******* ** thousands ** ******** ******* from **** ** ******.

Two ****** ******* ** ******* ********

** ******* *** ** installed ** * ****** by ******* **** ** shell ****** ** * linux ******* *** **** downloading **** ******** **** the **** **** * remote ******. **** ****** requires *** ****** ** be **** ** *** network ****** ** *** unit (****** *******, ** over *** ********).  ** has *** ******* ** being **** ** ** done ******* *** **** having ** ** ********, but ********** *** ******* to ********** ******** ** private ******** ** ***** that *** ********** ********.

******* *** ** *** an ******* **** * unit ** ** ********* new ******** *** *** device **** *** *** exploit ***** **, *** then ********* **** ******** onto *** ****. **** can **** ** **** remotely, ** *** ****** can *** *** *** the **** ** ******* the ******** **********. *** way ** ******** * user ** ******* *********** firmware ** ** **** the ******** ********* *** download, *** **** **** an ***** **** ******* to **** **** *** manufacturers ******* ********** ********** a ******** ******.

Securing **** *******

** ** ********** ** fully ****** * ****** connected ** *** ********, but *** *** ****** your ******* ** ****** by ********* ***** **********: 

  1. ****** ******* *********, *** usernames ** *** ****** allows **.  ****** ******** "admin" ** "*****" **** foil ****** ********** ****** ********.
  2. **** ******** ******** ***** from ************* ********, ***** this **** *** ********* files *** *** ***********, it **** ****** *** chances ** ******* ***** firmware.
  3. **** ******** ******* ** prevent *** ******** **** being ****, ******** **** the ************ ** ******* up **** ******** *******.
  4. ***** *** ** *********/******** that *** ****** **** equipment, ** ****** *** close ****** ******** ****** and ******* *** ***.

** *** ****** **** ******** ************* ************, ********** ******** ****** to ******* *** ****** risk ** *******.

What ************* *** **

******** ****** *** *** software **** *** ******** eliminates *** *** **** common ******* ** *******. ******* or ***** ****** ** rarely ****** ** ********** use *****, *** ** often **** ** ******* to **** ****** ** the ******.

************ ******** ********* ******** before ************ ******* * ***** attack ******. **** ******* ** not ****** *** ********* of ******** ***** ****** installing ****, ******** ********* to ****** ***** ******** ****** which *** **** ***** devices **** *********** ******* access *****.

********** *** ******** ***** can **** **** ** more ********* *** ******* to ********* **** *** check *** **** *** exploitable **********.

Comments (19)

Nice article. If we kee pushing the industry and best practices, these types of hacks will surely be minimized. Manufacturers, of course, play a large role here, but integrators have to do their part too. VPNs aren't always an option. Sometimes a device needs to be public facing. Restricting the access to that public facing device and monitoring traffic to it is essential.

Like it!

Confused about this though:

This allowed him to immediately determine that the exploit he created could be applied to thousands of deployed devices from over 70 brands...

An exploit can be installed on a device by gaining root or shell access to a linux console and then downloading code directly into the unit from a remote server.

Isn't the 'exploit' the ability to 'gain root' in the first place?

Sounds to me like you are saying, "Cars can be stolen by using the key to start the engine."

Isn't the 'exploit' the ability to 'gain root' in the first place?

In some sense, yes. In this case I was referring more to the exploit being the unintended code that was uploaded to the device and then executed by the device. But just the act of gaining root/shell access is also a form of exploit.

Isn't the 'exploit' the ability to 'gain root' in the first place?

Semantics, but as I see it, the ability to gain unauthorized "root" is the hack. The "exploit" is the change/action you make/take (usually nefarious) as a result of gaining unauthorized access-often installing malware.

The "exploit" is the change/action you make/take (usually nefarious) as a result of gaining unauthorized access-often installing malware.

Disagree. Though that makes sense in the common understanding of the word 'exploit', I don't think that is the usual meaning in cyber-security.

For instance if I use a brute force password program to gain root to a system and then I burn a DVD of all the credit card numbers, the exploit is brute force password attack, not copying files.

This makes sense, since otherwise the exploit could be any number of things, that could be done once you are root.

In this particular case, the result of "exploit he created" is nothing more than the root access itself. This is the usual meaning.

This was one of the two researchers whom I originally thought may have uncovered the Axis vulnerability. I ruled him out on that one and am happy to see this kind of coverage on IPVM.

Is there a way to know if a device has already been compromised? Or will defaulting and then upgrading to latest firmware eliminate any rogue hack placed on the device?

This is an excellent question.

The generally accepted answer is that there is no way to know for sure if a device has been compromised, especially when it comes to things like cameras where tools like chkrootkit are not yet adapted.

Defaulting a camera will only erase user-configured settings in most cases, it won't wipe out any rogue software that has been added.

The good part is that for most devices the firmware contains a complete image, operating system and all additional files/software needed to run the camera or recorder. Upgrading firmware should do a complete wipe and overwrite any malware. However, just like configuration settings can be saved across a firmware upgrade, so could installed malware if the hackers were particularly sophisticated and understood the internals of the device fully.

I do not think we are at the stage where malware targeted to cameras and recorders is at the point where it can survive across a reset/default and a firmware upgrade, but it is technically possible for this to occur. Hopefully we will see more advanced firmware and code checking implemented by manufacturers before the hackers get ahead of them in this regard.

I've got backdoors for DVRs that persist through a firmware upgrade. Most firmware updates don't touch the bootloader.

Considering the brands hacked, maybe it is time to quit selling the low end crap and start designing systems and networks with actual security in mind. You know, that thing we are supposed to do in the beginning.

Salespeople need to quit being price conscious and start selling the service expected of our industry. If end users are so price sensitive, it is time to educate them better to make better informed decisions about their security.

While I agree in general with your sentiments, I would like to know which brands are exempt from exploits, in your opinion?

So when you refer to 'low end crap', do you mean that higher price = cyber secure? 

It isn't the brands, per se, but how the systems are designed. Working with the customers' IT people can limit exploits, dedicated security networks. Or for the safest route, a system that is not connected to the internet, except in cases of service and maintenance.

However, using shells that anyone can write a GUI for can lead to exploits from outside sources, due to not maintaining a standard of care for securing the code.

Staying with companies whose software is vetted to limit potential exploits is part of the due diligence integrators must look at when selecting a VMS.

Can you help me identify "companies who's software is vetted to limit potential exploits" vs ones who don't?

Over the years, I and my co-workers have done that due diligence. I have systems I like, and systems I do not. But sharing that information is something I keep in house and treat as a intellectual property,.

Thanks! :)

I needed a good laugh today!

Whatever dude. Carry on with your systems, and I will do the same with mine.

Thank you Jon, you hit the nail on the head for sure! Comments like those are what leads to all of the "mis-information" we deal with.

There is a new botnet being reported, called "Tsunami", that looks to be targeting the TVT devices. So far ~227,000 vulnerable devices have been identified:

New IoT/Linux Malware Targets DVRs, Forms Botnet

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

HTTPS / SSL Video Surveillance Usage Statistics on Apr 01, 2019
HTTPS / SSL / TLS usage has become commonplace for websites to improve security and, in particular, to help mitigate attackers reading or modifying...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
LifeSafety Power NetLink Vulnerabilities And Problematic Response on May 20, 2019
'Power supplies' are not devices that many think about when considering vulnerabilities but as more and more devices go 'online', the risks for...
Vivotek Trend Micro Cyber Security Camera App Tested on Jul 22, 2019
Vivotek and Trend Micro are claiming five million blocked attacks on IP cameras, with their jointly developed app for Vivotek cameras. This new...
Dahua Wiretapping Vulnerability on Aug 02, 2019
IPVM has validated, with testing, and from Dahua, that many Dahua cameras have a wiretapping vulnerability. Even if the camera's audio has been...
Uniview OEM Directory on Sep 11, 2019
This directory lists 20+ companies that OEM products from Uniview, with a graphic and links to company websites below. It does not cover all...
Critical Vulnerability Across 18+ Network Switch Vendors: Cisco, Netgear, More on Aug 26, 2019
Cisco, Netgear and more than a dozen other brands, including small Asian ones, have been found to share the same critical vulnerability, discovered...
Warning: Windows 7 Update Crashing NVRs on Aug 26, 2019
Windows 7 updates are causing VMS servers to fail to boot. After running the update, impacted systems do not boot as normal, instead display this...
ONVIF Exposure To "Devastating DDoS Attacks" Examined on Sep 06, 2019
ZDnet reported "Protocol used by 630,000 devices can be abused for devastating DDoS attacks", citing exposure of ONVIF devices. And after an...
Dahua New Critical Vulnerability 2019 on Sep 23, 2019
Dahua has quietly admitted 5 new vulnerabilities including 1 critical vulnerability with a 9.8 / 10.0 CVSS score and 2 high vulnerabilities (scored...

Most Recent Industry Reports

Verkada Paying $100 For Referrals Just To Demo on Jan 22, 2020
Some companies pay for referrals when the referral becomes a customer. Verkada is taking it to the next level - paying $100 referrals fees simply...
Camera Analytics Shootout 2020 - Avigilon, Axis, Bosch, Dahua, Hanwha, Hikvision, Uniview, Vivotek on Jan 22, 2020
Analytics are hot again, thanks to a slew of AI-powered cameras, but whose analytics really work? And how do these new smart cameras compare to top...
Intersec 2020 Final Show Report on Jan 21, 2020
IPVM spent all 3 days at the Intersec 2020 show interviewing various companies and finding key trends. We cover: Middle East Enterprise...
Vehicle & Long Range Access Reader Tutorial on Jan 21, 2020
One of the classic challenges for access control are parking lots and garages, where the user's credential is far from the reader. With modern...
Clearview AI Alarm - NY Times Report Says "Might End Privacy" on Jan 20, 2020
Over the weekend, the NY Times released a report titled "The Secretive Company That Might End Privacy as We Know It" about a company named...
Favorite Camera Manufacturers 2020 on Jan 20, 2020
The past 2 years of US bans and sanctions have shaken the video surveillance industry but what impact would this have on integrators' favorite...
"Severely Impacted" Mercury Security 2020 Leap Year Firmware Issue on Jan 17, 2020
One of the largest access controller manufacturers has a big problem: February 29th. Mercury Security, owned by HID, is alerting partners of the...
Apple Acquires XNOR.ai, Loss For The Industry on Jan 16, 2020
Apple has acquired XNOR.ai for $200 million, reports GeekWire. This is a loss for the video surveillance industry. XNOR.ai stunned the industry...
Installation Course January 2020 - Last Chance on Jan 16, 2020
Thursday, January 16th is your last chance to register for the Winter 2020 Video Surveillance Installation Course. This is a unique installation...
Halo Smart Vape Detector Tested on Jan 16, 2020
The Halo Smart Sensor claims to detect vaping, including popular brand Juul and even THC vapes. But how well does it work in real world...