This is an IPVM report available to you via this special link only until Dec 11, 2026 05:00 AM

Directory of Video Surveillance Cybersecurity Vulnerabilities and Exploits

Published Apr 01, 2024 23:35 PM

Cybersecurity vulnerabilities have escalated over the past few years and keeping track of who is impacted by each can be difficult.

IPVM Image

This list, updated for 2024, compiles reported exploits for the security industry by date and by manufacturer, with a brief description of each exploit, the affected product(s) and version(s), and links to further reading for each.

Those interested in cybersecurity should also see our Cybersecurity Rankings reports:

Exploit Timeline

The timeline below shows a summary of each vulnerability along with a link to our reporting or other information.

Click to view this timeline full screen.

Exploits For Specific Companies

The list below sorts these exploits by each company for easier reference:

ADT

Aver

  • September 2016 - Firmware version X9.03.24.00.07l, and possibly earlier versions, contain multiple vulnerabilities including hard-coded admin-level accounts and authentication bypass exploits. Additional details in CERT report.

Avigilon

Axis

Bosch

  • December 2023 - 3 Vulnerabilities Analyzed, which allowed command injection and denial of service.
  • February 2020 - Bosch, Multiple Self-Reported Vulnerabilities: two 10.0 critical vulnerabilities along with 8.6 and 7.7 rated vulnerabilities. The first 10.0 vulnerability affects Bosch BVMS and uses deserialization of untrusted data which attackers can use to remotely execute code. The other 10.0 vulnerability applies to their Video Streaming Gateway and is also remotely exploitable due to the VSG services missing authentication for critical functions.
  • October 2014 - DVR 630/650/670 units with firmware version 2.12, and possibly older versions, are vulnerable to exploits where attackers can send specially-crafted URLs to the device to enable telnet access, which provides a root console that does not require authentication. No special software is required to carry out this attack. Vulnerability details and proof of concept examples are listed in ExploitDB under ID 34956.

Cisco

Dahua

Dedicated Micros

  • August 2015 - Dedicated Micros DVRs, including at least DV-IP Express, SD Advanced, SD, EcoSense, and DS2, ship with no default credentials, and insecure protocols enabled. This can allow attackers to take over the device and/or to sniff network traffic during setup. Additional details in VU 276148.

Dormakaba

FLIR

GeoVision

  • July 2023- Geovision 9.8 Critical Vulnerability From Uniview Examined- The US government disclosed a critical 9.8 vulnerability in a Geovision camera, CVE-2023-3638, regarding improper authentication in a Geovision GV-ADR2701 IP camera. IPVM verified that this is not truly from Geovision but OEMed from Uniview
  • January 2018 - In firmware older than December 2017 one can gain root access with either a curl command within CLI or http in a browser. This is a simple copy / paste / enter specific IP address. There are 15 separate vulnerabilities that range from capturing a screen shot to printing the camera credentials in clear text. IPVM covered this here.

Geutebrück

  • July 2021 - G-Cam E2 and G-Code equipment is very similar to their vulnerability from 2017; an authentication bypass vulnerability has been identified. The existing file system architecture could allow attackers to bypass the access control that may allow remote code execution. More details from CISA here.
  • February 2017 - In G-Cam/EFD-2250 with firmware version 1.11.0.12 an authentication bypass vulnerability has been identified. The existing file system architecture could allow attackers to bypass the access control that may allow remote code execution. Details in ICS CERT Advisory.

Hanwha

HID

Hikvision

Honeywell

  • January 2020 - Honeywell Maxpro VMS & NVR Vulnerability - Attackers are able to remotely execute code and via SQL injection vulnerability an attacker can could gain unauthenticated access to the web user interface with admin rights.

LenelS2

  • December 2022 - LenelS2 critical vulnerability, with a 9.8 CVSS score, impacting software solutions used by enterprises and governments globally. IPVM examines a critical vulnerability that enables an authentication bypass through a bug in RabbitMQ's implementation of the TLS protocol.

Lilin

  • March 2020 - LILIN Vulnerabilities Used by DDoS Botnets - 3 Vulnerabilities: command injection vulnerabilities with NTUpdate, FTP, and NTP, hardcoded credentials, and arbitrary file reading vulnerability with LILIN DVRs.

Milesight

  • November 2016 - Milesight camera firmware prior to ~November 2016 may contain a number of vulnerabilities including hard-coded credentials and the ability to execute admin commands via unauthenticated CGI calls, making the cameras highly vulnerable to attacks.

NeoCoolCam

  • August 2017 - HTTP and RTSP service are vulnerable to multiple forms of buffer overflow attacks. Devices use uPNP to open ports in firewall, making them exposed by default in many installs. ~170K units impacted. Full details in Bitdefender whitepaper on NeoCoolCam vulnerability.

Netgear

Network Optix

Nuuo

  • October 2016 - Nuuo NT-4040 Titan firmware version NT-4040_01.07.0000.0015_1120, contains default credentials of admin:admin, and localdisplay:111111. A remote network attacker can gain privileged access to a vulnerable device. Further information can be found in CERT Vulnerability Listing for this issue.
  • August 2016 - Multiple devices, including the NVRmini, NVRmini2, Crystal, Titan and NVRSolo with firmware prior to 3.0.8 have multiple vulnerabilities that allow for remote code execution, remote root exploit, remote file deletion, and other attacks. Exploits are listed on ExploitDB under multiple IDs, including: 40200, 40209, 40210, 40211, 40212, 40213, 40214, 40215. Each of these represents a critical vulnerability that is easy for an attacker to execute against the device.

Pelco

Raysharp

  • February 2016 - Raysharp DVR's sold under various brands has firmware with multiple exploits, including ability to bypass authentication and get telent access. Details can be found on the researchers blog.

Sony

  • July 2018 - Sony Talos 2018 Vulnerabilities - Allows commands to be executed without Admin credentials, however attacker needs to know what commands to execute so it is more complex than some other, simpler vulnerabilities.
  • December 2016 - Attackers can remotely enable telnet on Gen 5 and Gen 6 cameras with firmware prior to 1.86.00 and 2.7.2 respectively, enabling them to potentially login as root. Additional details in our coverage of this exploit.

Siemens

  • November 2016 - Specially crafted URLs allow an attacker to gain admin-level privileges on affected cameras. List of affected cameras and recommended firmware versions to resolve this issue are provided by Siemens.

TBK (OEM Night Owl, Q-See, And More)

Turing

TVT

Ubiquiti

  • March 2021 - Ubiquiti 'Catastophic' Data Breach - Unauthorized access of some of their systems hosted by a "third-party cloud provider" (Amazon Web Services).
  • March 2017 - A command injection vulnerability was reported in firmware prior to AirOS 8.0.1. Relatively low risk of exploit, but could enable severe holes in network, such as reverse shells, if properly executed.

Uniview

Verkada

  • March 2021 - Verkada Mass Hack - Hackers were able to get root / admin access on all ~150,000 cameras and were able to pivot to other systems on customers' networks.

Vivotek

  • November 2017 - Potential for stack overflow, likely resulting in denial of service, via malformed URL calls. Details in Vivotek Remote Stack Overflow Vulnerability.
  • July 2017 - CGI scripts on Vivotek cameras can be used to access files and run commands as root. Additional coverage: Wrongly Accused Critical Vulnerability for Vivotek
  • November 2013 - Firmware 0105a, 0105b, and possibly other versions, are susceptible to having RTSP authentication bypassed, allowing video streams to be viewed without authentication. Firmware after 0301c should not be affected. Additional information from Core security: Vivotek RTSP auth bypass.

Wansview (AJ Cloud)

Wyze

XiongMai

  • February 2020 - Chinese NVR/DVR Vulnerability - Huawei (HiSilicon) backdoor uses a combination of port knocking to open enable telnet along with hardcoded root credentials.
  • December 2017 - Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks
  • October 2016 - Xiongmai firmware prior to January 2015 shipped with telnet enabled, which coupled with well-known admin credentials allowed attackers to gain access to a root shell and exploit the device. The most popular exploit was the Mirai botnet, which targeted Dahua and Xiongmai devices, and took down internet sites and service providers in October 2016. Due to Xiongmai being primarily an OEM component supplier, many affected products were sold under alternate brands.

Beware Of OEMs / Relabeling

Firmware and software vulnerabilities often affect other brands manufactured by companies listed in this directory, since OEM'd equipment typically has the same fundamental software. For example, Dahua camera vulnerabilities will be present in Amcrest branded cameras that are manufactured with the same or similar firmware.

An example of this is the Dahua Wiretapping Vulnerability, which was originally discovered in Amcrest cameras or the Hikvision Backdoor, which affected LTS, W-Box, and others.

To find out which brands might be affected, see our OEM directories:

Vulnerability Discovery and Disclosure

Who discovers and discloses each vulnerability varies from manufacturer to manufacturer and incident to incident.

It is common for a researcher to discover a vulnerability within firmware and present that finding to the manufacturer. Typically, manufacturers are given a period of time to correct the vulnerability before the hacker publishes details or proof of concept. Researchers provide the manufacturer with time to correct the vulnerable software before publishing details, such as a proof of concept exploit, though many are published after non-response by manufacturers.

Less commonly, manufacturers discover and disclose vulnerabilities during their own internal testing. For example, Axis' most recent vulnerability was self-discovered and disclosed on their product security page.

2020-07-31 An internal software security audit discovered a flaw in the protection against device tampering (known as Secure Boot) in AXIS W800 and AXIS S3008. Read the Axis Security Advisory for more information.

However, this is less common than third-party disclosures.

Other Vulnerabilities

This directory is intended to cover major vulnerabilities over the past several years, but is not exhaustive. If you feel we are missing an exploit, send us an email or securely send us a tip.

Comments (19)
Avatar
Kevin Mundy
Jul 29, 2021
Stanford University

***** ******* **** ****! **** **** coming ** **** ** ** ********** and * **** ** *** **** on *** ***** ** ************* ******* to ******** ******** ********. *** ***** not ******* ** ** ********** *********** like ****** * **** *** ***** a ********** ********** ***** **** ***** to *********.

* ** ******* *** **** ****** who ***** ** ** ** ***** cyber **** ******** **** **** ***** two ***** ***** ***. **** ****** be ** ** *** ***** ***** of **** *** ** ******** ** having ****** *** **.

************* & ************** ******** ****** - Industrial ******* *******

**** ******** *************** ********

*** *** *** **** *** *** from *****************ü** *-*** ** *** *-**** | CISA** **** ****.

(1)
(4)
Avatar
John Scanlan
Jul 29, 2021
IPVM • IPVMU Certified

******, *****, * ***** *** ****** Geutebruck ************* ** *** ******** *** report.

(1)
UI
Undisclosed Integrator #1
Jul 29, 2021

********* ****. * ****** ********** *** of ***** ** *** ********** ********.

UI
Undisclosed Integrator #2
Jul 30, 2021

* ** ********* **** *** *** vulnerability ** * *****. * ******* they **** **** ** ****. ***** like **** *** ***.

(1)
UM
Undisclosed Manufacturer #3
Jul 30, 2021

* ***** ******* ** ***** *** still *** ***** ************** ******* **** their ****. **'* *** ******* * vulnerability ** ******, *** **'* **** a **** ** ******** - * "locked" **** **** ** ***** ******.

UI
Undisclosed Integrator #4
Jul 30, 2021

*** **** *** *** ** ********, although ********** ** *** ** *********** to *********. **** ********* *** **** source **** ** ***** *******. ** they **, **** *** ******** ** publicly **** **** ***********, ****** ** their ************* ** ** ***** ******* somewhere. *** *** ******* *************** ** those ****** ** **** *** **** if *** ******** *** ******** ** in *** **** **** ***** ***************.

(1)
bm
bashis mcw
Jul 30, 2021

**** ** *** ***...

(3)
U
Undisclosed #5
Aug 02, 2021
IPVMU Certified

IPVM Image

****, *****, ****, ***…

bm
bashis mcw
Aug 04, 2021

****** *** *** *** ,)

(1)
(1)
DL
David Leinenbach
Jul 31, 2021

****** ****.

DF
David Fitches
Aug 01, 2021

***** **** - **** ** ******!

PM
Paul Mockenhaupt
Aug 02, 2021

**** *** ******* **** ************ ********* at *******ü**.

***** ** **** ** *** *********, we ************ ********* * ******** ****** for *** ** *** *-**** ******* series, ***** ** ********* ** *** partners *** *********.

*** *** **** **** *********** ********* mitigation **** -*******ü** *-*** ** *** *-**** | CISA

IPVM Image

(3)
Avatar
John Bredehoft
Aug 02, 2021
Bredemarket / Incode Technologies

*****! *** ****-**** ******* ** ********** vulnerabilities ** **** **** ******** **** the *****-**** ******* ** ******* *** someone **** ** ******** ****. ************* IT ************* **** **** *************** ** occur *** **** ******* ********* *****.

(2)
Avatar
John Scanlan
Sep 20, 2021
IPVM • IPVMU Certified

**** ****** *** **** ******* **** the ********* **** *************** *********************.

Avatar
John Scanlan
Oct 06, 2021
IPVM • IPVMU Certified

**** ****** *** **** ******* **** the******* **** *************** **** ****.***********-*********************** **** **** ********** ** **** firmware ** * ************* **********, ********* 300+ ******.

SM
Salvador Martinez
Nov 04, 2021

* ** ** **ï**...

FO
Fawaz Owayda
Jan 17, 2022
IPVMU Certified

***, **** ** **** ********. ***** you *** *** ****.

AM
Andrew Myers
Mar 30, 2022
(1)
GL
Garrett Lucas
Jun 28, 2022

***** **** **** *******.