Uniview Recorder Backdoor Examined

Author: Brian Karas, Published on Oct 20, 2017

A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua backdoor.

IPVM spoke with the researcher behind the discovery and Uniview to determine the severity and impact of this discovery.

In this report we share Uniview's response and our analysis.

* ******* ******** ***** *** ********** * ************* ** ******* recorders **** ****** ******** ****** ** * ****** ******* ** the***** ********.

**** ***** **** *** ********** ****** *** ********* *** ******* to ********* *** ******** *** ****** ** **** *********.

** **** ****** ** ***** *******'* ******** *** *** ********.

[***************]

Samsung ************* ****** / ******** ******* ***

*** *** ****** *****,***-****-*****, ********* **** ************* *** *******, *** *******. **** *** verified **** *** ************* ** ** ******* ********* *** **** Samsung / ****** *** ****** * ******* ****** ** ******* recorders ****** *****. *** *********** *** ****** * ******* ***** model *** **** *** ***** ** *** **** ** *** report ** *** ************ ******* ******* *** *******.

* ********** ** ******** ***-****(***) *** *** *******-******* **** **** *** *** ******** (******) show *** ******** ************ ******* *** *****:

Vulnerability ********

*** ************* ******** * ******* ** ********** * *** **** the ******** ***** ******** * **** ** *** ***** ********. This **** *** **** ** **** ** ********** *** *** login, ******* *** ***-********* **** **** ** *** **** ******* of ******* ** * ****-******** ********. ***** ** ****** * user ** ***** ** *** ***** *** ********* **** ***** privileges, *** ******* *** ******** ********* ** *** ***** ****.

Researcher ********

*** ******* ****** *** *********, "******* ******** *******" ********* **** after ********* ****** *** ***, ******* **** **** * ******** research ************ ***** ** *******. **** ** *** **** * website, *** **** ********** ** *****, ********* ********** *******, **** as ***** # *** ******** ** *** **** ******, *** Skype.

** **** *** **** ******** *** ********** ********* ******* / Hanwha ****** **********. ********* *********** ******* ************* ** ********* ************* to ******** ******* ** **** ** *** ********** *******.

Models ********

****** **** **** *** ************* ******* ** ***** ********* *** not ** *******. *** ******* *** *** ******* ******** ****** or ******** ******** ********, *** **** **** **** ******* **** information **** ******* ******** ** *********, ********* ******** *** ******* 31st ****.

**** ******* ** ******** ********* ***** (*** ******) ****** *** vulnerability ******** *** ******* ********* ******.

****** (*** *** ****** *******) ****** *** ********* *****-**** ****** are ********:

  • ***-****
  • ***-****
  • ***-*****

Ease ** ******* - *******

********** **** ************* **** ******** ********** *** ***** ******** **** with *** ***, *** **** ******* **** **** **** ******* URL ** ***** ** *** **** ** *****. **** *** be **** ** *** *****:

  1. *** *** ***** ******** **** ***** **** ***: ****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*} (**** for "*************", *** ****** ** ********** ***** ** *** ***** password ****)
  2. *** ** ** ***** ** * ******* ******** ***** **** URL: ****://**.***.**.**:****/***-***/****-***?****=*&**********=*****&************=***********************

*******, **** ************* ** **** **** ** ******* *** **** not ******* *** ******** *********** ** ********* *********.

Minimal ******-****** *******

******* **** *** ******* ******** **************** **** *** ******* ******, **** *** ******** ** **** being ** *** **:

Uniview ****, *** ********

[*******]

******* *** ***** ********* ******* ******** *** **** *************. ********* to *** *******, *** ******* *** ** *****/******* ** ** use *** ********'* *****-** ***** ******* *****. **** *****->*********** ***** should ** * "*****" ****** ** ***** *** *** ********:

******** *** "*****" ****** **** ***** *** ******** ** ***** for ******* ******** *** ******* *** ****** ** *******:

******* ******** *** ********* **** *** ********** **** *************:

*.******* **** ******* * *** ******** ****** ** ***** *** issue ** *** ******* ****. *** ****** ******* **** ** ********.

*.******* **** ******* *** ***** ******** *** ******* ******** ** Nov. ****.

*.******* **** ******* * *** ******** ** *** ** ******** which **** *** * ******* *** *** ****** *** ***** security ************** *** **** ***** ******** ****.

*** *** ****** **** *** ******* ** ******** **** *** impacted ** **** *************, ** **** ******* ** ******** ********* simultaneously **** ** ******* *** *** ********.

** ** *** ******* ******* *** ******** ** **** ************* before ** ********* ****, *** **** **** ********** ** ** once **** ***** ** *** *****.

OEM *****

**** ************* ***** ******* ******* ** *** ***** ********** **** relying ** *** *************. ******* ****** ****** ** ******* ** a *** ** **** ***** ** *** ******* ***** ***** units **** ****, *** **** **** ****** ** ***** ***** due ** *** *************. *******, ***** ********** **** ********** **** may **** *** *** *******. ******* **** ***** ******** **** affected ********* ******* **** *** *** *** ** '*********' ******* product, *** **** ******* ** ****** ******* ** ******* ** resolve **** *****.

***** ** *******'* ******* ******** *** ******** *******, ** ** clear **** *******'* ******* ******* ** ****** ***** *** ***** before ********** **** *** *** *** ********. ******* ************** *** been **** ********** **** ***** *** ********* **** **** *** similar *************** ** *******, ******* **** *** ********* *** ***** 2nd ******** **** *** *** **** ***** ******* ***** ***** own ***** ** *** **** *******.

Comments (36)

**** ******* ** ******** ********* ***** (*** ******) ****** *** vulnerability ******** *** ******* ********* ******.

** * ****** ********** ** ******* ********, **** ** ** great *******. **** * **** **** *******, * *** ** operations ******* ** **** ** *** **** ********** *** **** tests ** *** ** *** ******* ******* ********* **** ** sell **** **********. ** **** *** **** **** ** ********* this *************. *** * ****** **** *** **** ****** ********** are *** **** *** *******?

**** -

**** *** *** ** *** * ****? **** *** *** you ***** *** ********* **, **** ********?

******* ********** ********* **** ******* **** **** **** *** ******* OEMs, *** ** ****** ** *** ******, *** *** ******* specific ****** ********.

** *** *** ***** **** ****/********** ******* *** *****/******** ** might **** ****** ** *********** ***** ***** *** ********** ** not.

* **** ****** * *** ***** ** *** **** *** Shodan ****** *** *** * ***** **** ** *** ***** units ***** ******* ** *** ******* ******* **** ******** ** read *** ****** ********, **:

****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*}

******* **** **** ** *** **** **** ** *** ************* (if *** ****** *** *** ****** ******** **** *** ****, you ****** ******* ** **** **** ******).

*** *** *** ** *** *** * ***** **** ** a ******** * *** **** ** ******* * ******** **** from - ****** *****:

***-***-**:********* ***$ ./*******.**
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** *** *** ******** ****.
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"

* ***** ** ******* **** **** ***** # *** ******** build *** ** *** ****** *** *** ******** **** **** from *** ******.

** **** **** ** ***** ******* **** *** ***** ***** right *** ** ******* *** ***** *** ****** ******. * will *** **** **** ***.

***** ********:
"*************": "********************************"

** *** *** * ****, ****** **, ** ***** *** websites ********** ******* ****** ****** *** ****** ** ****** ********* with ********* ******* **********. *** ********, ******** "********************************" **** *****'* **** *****, **** **** *** "******" (****** using ***) ***** ** ******** *** **** ********.

** ** ***** **** **** *** **** ******* *** ****** of *** ********. **** ****** ** ***** ****** ****** ** a *******.

***, **** *****. * ******* ******* **** ***** ******* ****** to *** *** **** ***** *** ****** ******* **** ******* with **** ************* *** ******* ** **** ** **** *****. But ** *** **** *** * **** ******** **** ******* even **** ****/**** ** *******.

******, **'* **** * **** ** ********** **** **** ** the ****** *******. **'* *** ****** * *** ********* ********* for ***** *******, ******* *** ****** * ****** ***** *** company ** ***** *** ********* *********. ********* *** ******* **** hacked *** **** **** **** *********** *** **********.

*'** ***** ******* ** ***** ******** ***** ****** *** ** will *** ****.

*** *** ***** ** ** **: ******@****.***

***** ** *** *** ********

**** ******* ** ******** ********* ***** (*** ******) ****** *** vulnerability ******** *** ******* ********* ******.

**** *** *** ****?

** ***** * **** ** ***** ******* ****?

***********, **** *** **-******.

**** ** * **** ** *******'* ******* ***** ***** *** are ***** ****** *********** ** *******. ** ** *** *** at **** ****, ** **** **** ******* ******* ********. *** question *** *** ***** *** *******:

****://**.*******.***/********/*******/********/*************/

*** **** *********** **** ** *** ***** ******* ** **** 'szUserName' ** ****, *** *** ******* ** ***** *** "*****".

****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*}

* ****** *** '****' **** *** **** **** *** ************** mechanism ** '*******' *** **** ** **** ** **** *** sensitive **** **** ***** **********...

*** **** ** ** ** **** ***** **** *****? ** if *** *** * **********, *** **** ** ** ** know **** ** * ****? *** *********** ** ****?

****'* *** *****. ** ***-******** *** * ******** ****. **** in * ***** ** **** ** ****** ****** ** *** their **** ***** **** *******. **** * **** ** ******** Dale *** ******, * **** **** * **** ** ***. When ** ******** ***** **** ******, * ****** ****, ***** all *** ***** ** ** ***, **** *** *****, *** ensure ** ******* *** *******.

* **** ***'* ******* *** * *** ******* ******* ***** have ***** ******.

** ** *** *** * **********, *** **** ** ** to **** **** ** * ****? *** *********** ** ****?

** ** **********, ** ** ****** *********** ** *****, *** partly **********.

** **** ***** * ********* ***** ** ***** **** ** required ** ***** ****** ****, *.*. ******* * **** **** as**** ***. ** **** ***'* **** *** ****** ** ****** ***** own *********, **** ****** ******** ***. ** *** ********, *** insecure **** * ********* ****** ** ****** ** ** ******** to *** ******** *.*. ******* *********** ***'* **** ** **, that's *** ****, ** ** * *********** **** ** ******* skill **** **** ***'* ****.

** *** **** * ********* ***** ** **** * ******* resistant ** ******* ****** ***** ******* **** ** ********** **** any ******* ********. ** ** **** ********, ** *** **** like **** *** *** ******* *** **** **** ****** **** time. ** **** **** ******, **** **** ** **** ** features **** ***** ******, ********, *** ***** *** ******** *** and *****. ********, ******** *** ***** ******** **** ***** ******, CEOs *** *** ** ** ***** ******** **** **** ****** priority ** ***** ** ******** **** *** ** ****** ** bullet ****** ** ********* *********.

** ** *** *** * ******** ******* ***** ******** ** important, *** **** ** *** ******* ** * ************* *********, or **** *** ******* ***** ***** *** ******* *** ***** with ** ** * ********** *****.

* ****** *****, *** ** **** ******* ***** *** ******* / **** ******* *** ********** *** **** ****** ******* ********* on * ******* *****.

** * ******* ** *** *********** ** ********** ** ******* until ** ** **********

*** **** ** ** ** **** ***** **** *****?

*** ** ****, *** **** **** ** ***** **** **** reading *** *** ** ********** *** ****

** ** *** *** * **********, *** **** ** ** to **** **** ** * ****?

*****, ********* *** *** ******* - ***** *** ** *****, this ** *** *** **** ** ******* *** *** *** portable ** ** '*****'

*** *********** ** ****?

******** *** ****** *** *** *********** *** *** ** ** there

* **** ***'* ******* *** * *** ******* ******* ***** have ***** ******.

*************, * ***** *** **** **** ** *** **** ** this *** * *****....

**** *** *** * *** **** ******** *** (** *'* curios), *** * ******** ***'* ***** ******* **'* * ********, it's ***** **** **** - **** **** ********** ** ******** whatsoever.

*** ** ***** *** **** ****** **** '******()', *** ** sanitation ********** ** **** ******** *****, ***** ***** **** ****** code ********* (***) **** **** *********.

* ******* ***** *** ********, *** ******* ****** **** ** absolutely ******.

* ******* ***** *** ********, *** ******* ****** **** ** absolutely ******.

*** **** *** ** ******** ************...

******** **** ******** ** ***, ******** * **** ***** ** who ****** ***.

*** ***** **** **, ** *** ** **** *****? (********** I ******* ***** ****** ** ****)

***** ****'* ****** *** ***** ****, ** ***.

****:

***** *** **** *** *** **** **** **** ********:*****://******.***/*****/***-*********-***

******** **** ******** ** ***, ******** * **** ***** ** who ****** ***.

*********, ***** "******" ******** ;)

* ******* ***** *** ********, *** ******* ****** **** ** absolutely ******.

* ******* *****'* ***** * *** ** ****** *** *****. About * **** ***, * *********** * ****** **** ********** ignored *** ******** *** ******** **** ********** *** ****. * told **** ***** *** *******, **** ****** **, * ********* and **** ********** ****** ** *** **. **** ****'* ****** overly ********* ***** *** ******* ** ***.

** *** ***, *** ******** *** **** ******** **** ** both *** ******* ******** *********** *** **** ****** ********, *** reached *** ** *** ******* ******** ********** ** ***** ******. I'm **** **** *** ******* *****, *** *** **** **** in **** **** ***** *** ****.

*** ** *** *** ***** *** ******** ** ***** **** the *** * ******* *************.

** ** ****** ***** ** ***** ***'* **** ** ** published?

***** ** ** **** ** *** ***** **** ***** *********** in ***** **** ** **** **** **** *** *** *** 3, **'* * **** *** ***** *** *** ** **** less ****** ******* ******* *** **** *** *****.

***** **** ****** ** *** ******* * ***** *******, *** has **'* *** ***** ******** ********, *** * *** *** I *** **** ***** **** * *** ** ******** ******.

**** ****** **** ********* **** **** ****** ****** **** *** PostMan ********, ***** *** ** * *** ******* ** *** are *** **** ** ******* **** **. * ***** * little **** ****** **** ***** ******, *** ******** *** *** do **** *** **** *** ******* *** *** ******* ******** fancy.

*** ***** ** ****/*******:

*) *** *** ***** ******** ****: ****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*}

*) *** ** ** ***** ** * ******* ********: ****://**.***.**.**:****/***-***/****-***?****=*&**********=*****&************=***********************

**** ******/******. * **** ******** **** ****** ** * *** random ****** *******.

[**** ****: ****** ** * ******* *******.]

****** **** ** ****** ** ** ** ** ******** *********** on *** ** ******* ** ******* *** ** ********* ***** people's ********** ******* ******* **********???

* *** **** ******* ** **** ** ****. * **** said "****" ** ** **** ** ***** **** ** ***** it ** **** ****** *******.

[**** ****: ****** ** * ******* *******.]

**, *********** ***** *** ********** ****** *** ***.

*** *******, **** #* ******** ******* *** *** ****** ***** be **** *******, *** ********* ******* *** ************* ** *****.

**** #* ** *** *********.

**** ********** ** **** ****:****** * **** **,*** ***** *******?

**** ** ****** ** *********** *** **** *********** ** **** is ********* ** *** ******** ********* ***.

*** ******* ** **** ****** ** ** ***** ******* *** may ***, ****, *******, ** ******* ******* ********* ** ********* if ***** ******* *** ********** ** **** **** *** *** appropriately ** ***** ** ****** ****.

** *** ********* *** ************ **** ****** *** **** **** for *** **** ** ******* ********.

* ******* **** ********* ** ** ********* ******** ****, *** do *** ****** ***** **** **'* ********** *** *********** ** provide * ***-***-********* (**?) ******* ** *** ** ******* ****? While *'* **** **** ****** **** **** *** **** ** the ****** ** ***** ** *** ********, **** ******* **** it ***** **** *** ***** ***** *** ****** ***** ******* in ** ***** ****** *** ***** ********* ******* *** ******** them *** ***** ** ** **? ***** **** *** ** effectively *** **** *********** ********* ** *** ****** *** ***, you **** ***** ** ** * ****-****, ****-****** **** *** simplified ** ** **** ****** *** *** ** ****** ** seconds.

* ********** **** *******, ******* * ** *** ******* ** have ******* *** ***** ** ****** *** ***** **** ** use **** ************* (** ****** ** **** ********* ******* *** other *********) **** *** ********* **** ***** *** ******* ****** figure *** ** ***** ***. **** ** ** ********* ****** exploit, **** ** *** ***** ******* *****. *** **** *******, passing **** ******** ****** ** ** **** ****, ** ****** as ****** ** ** **** (*** **** *** **** **** complex ************'* ***** ****** ********).

*** **** **** ** **** ** **** ** *** ******* been ***** ** **** ************* **** ** ** ** *** make ** ********** ***** *** **** **** ** ***** ******** are, *** **** ******* *** ******, *** *** ************ **** expose ** ******* **** **** **** ** **** ** **** risky **** **** ****** ***. **, ****** **** ** ** and ***** "**** ***'* ****** ** **, ** ***** *** much ****** ** ****** **** ***."

[******]

******* *** ***** ********* ******* ******** *** **** *************. ********* to *** *******, *** ******* *** ** *****/******* ** ** use *** ********'* *****-** ***** ******* *****. **** *****->*********** ***** should ** * "*****" ****** ** ***** *** *** ********:

******** *** "*****" ****** **** ***** *** ******** ** ***** for ******* ******** *** ******* *** ****** ** *******:

** ******* ****** **** ******** *****?!?! *************!
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
Hikvision FIPS 140-2 Cybersecurity Certification Examined on Aug 27, 2018
A week after the US government passed a law banning Hikvision, Hikvision announced it had obtained a FIPS 140-2 certification from the US...
Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...
July 2018 IP Networking Course on Jul 12, 2018
Registration is closed. This is the only networking course designed specifically for video surveillance professionals.  Lots of network training...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring (now US government banned) Dahua as a...
Debating Relevance of China Hacking US Navy Plans on Jun 11, 2018
"Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to...
Remove Dahua and Hikvision Gov Installs Required By US House Bill Ban on Jun 06, 2018
The final released US House Bill HR 5515 verifies that it not only prohibits the purchasing of Dahua and Hikvision products, it requires removing...

Most Recent Industry Reports

Hanwha Dual Imager Dome Camera Tested (PNM-7000VD) on Oct 18, 2018
Hanwha has introduced their first dual-imager model, the PNM-7000VD, a twin 1080p model featuring independently positionable sensors and a snap-in...
Camera Height / Blind Spot Added to IPVM Camera Calculator on Oct 18, 2018
IPVM has added camera height and blind spot estimation to the Camera Calculator. This is especially helpful for those who need to mount cameras up...
Axis Strong US Growth, Flat EMEA - Q3 2018 Financials on Oct 18, 2018
This spring, Axis had its best financials in many years (see Axis Strong Q2 2018 Results). However, over the summer, Axis had many products sold...
Best Alternatives to Banned Dahua and Hikvision on Oct 17, 2018
With the US government ban and a growing number of users banning Dahua and Hikvision, one key question is what to use for low cost? While Dahua and...
Video Quality / Compression Tutorial on Oct 17, 2018
While CODECs, like H.264, H.265, and MJPEG, get a lot of attention, a camera's 'quality' or compression setting has a big impact on overall...
Knightscope Winning Investors, Struggling With Growth on Oct 16, 2018
While Knightscope's new financials show the company only winning 11 new customers in the past 12 months, the company continues to win new...
Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Huawei Admits AI "Bubble" on Oct 16, 2018
A fascinating article from the Chinese government's Global Times: Huawei’s AI ambition to reshape industries. While the Global Times talks about...
ADI's Financials Revealed + W-Box Growth Priority on Oct 15, 2018
  ADI is one of the most powerful distributors in the security industry but how big are they? How much profit do they make? How much do they sell...
Dahua Face Recognition Camera Tested on Oct 15, 2018
Dahua has been one of the industry's most vocal proponents of the value that AI creates: As part of this, Dahua has released a facial...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact