Uniview Recorder Backdoor Examined

Author: Brian Karas, Published on Oct 20, 2017

A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua backdoor.

IPVM spoke with the researcher behind the discovery and Uniview to determine the severity and impact of this discovery.

In this report we share Uniview's response and our analysis.

* ******* ******** ***** *** ********** * ************* ** ******* recorders **** ****** ******** ****** ** * ****** ******* ** the***** ********.

**** ***** **** *** ********** ****** *** ********* *** ******* to ********* *** ******** *** ****** ** **** *********.

** **** ****** ** ***** *******'* ******** *** *** ********.

[***************]

Samsung ************* ****** / ******** ******* ***

*** *** ****** *****,***-****-*****, ********* **** ************* *** *******, *** *******. **** *** verified **** *** ************* ** ** ******* ********* *** **** Samsung / ****** *** ****** * ******* ****** ** ******* recorders ****** *****. *** *********** *** ****** * ******* ***** model *** **** *** ***** ** *** **** ** *** report ** *** ************ ******* ******* *** *******.

* ********** ** ******** ***-****(***) *** *** *******-******* **** **** *** *** ******** (******) show *** ******** ************ ******* *** *****:

Vulnerability ********

*** ************* ******** * ******* ** ********** * *** **** the ******** ***** ******** * **** ** *** ***** ********. This **** *** **** ** **** ** ********** *** *** login, ******* *** ***-********* **** **** ** *** **** ******* of ******* ** * ****-******** ********. ***** ** ****** * user ** ***** ** *** ***** *** ********* **** ***** privileges, *** ******* *** ******** ********* ** *** ***** ****.

Researcher ********

*** ******* ****** *** *********, "******* ******** *******" ********* **** after ********* ****** *** ***, ******* **** **** * ******** research ************ ***** ** *******. **** ** *** **** * website, *** **** ********** ** *****, ********* ********** *******, **** as ***** # *** ******** ** *** **** ******, *** Skype.

** **** *** **** ******** *** ********** ********* ******* / Hanwha ****** **********. ********* *********** ******* ************* ** ********* ************* to ******** ******* ** **** ** *** ********** *******.

Models ********

****** **** **** *** ************* ******* ** ***** ********* *** not ** *******. *** ******* *** *** ******* ******** ****** or ******** ******** ********, *** **** **** **** ******* **** information **** ******* ******** ** *********, ********* ******** *** ******* 31st ****.

**** ******* ** ******** ********* ***** (*** ******) ****** *** vulnerability ******** *** ******* ********* ******.

****** (*** *** ****** *******) ****** *** ********* *****-**** ****** are ********:

  • ***-****
  • ***-****
  • ***-*****

Ease ** ******* - *******

********** **** ************* **** ******** ********** *** ***** ******** **** with *** ***, *** **** ******* **** **** **** ******* URL ** ***** ** *** **** ** *****. **** *** be **** ** *** *****:

  1. *** *** ***** ******** **** ***** **** ***: ****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*} (**** for "*************", *** ****** ** ********** ***** ** *** ***** password ****)
  2. *** ** ** ***** ** * ******* ******** ***** **** URL: ****://**.***.**.**:****/***-***/****-***?****=*&**********=*****&************=***********************

*******, **** ************* ** **** **** ** ******* *** **** not ******* *** ******** *********** ** ********* *********.

Minimal ******-****** *******

******* **** *** ******* ******** **************** **** *** ******* ******, **** *** ******** ** **** being ** *** **:

Uniview ****, *** ********

[*******]

******* *** ***** ********* ******* ******** *** **** *************. ********* to *** *******, *** ******* *** ** *****/******* ** ** use *** ********'* *****-** ***** ******* *****. **** *****->*********** ***** should ** * "*****" ****** ** ***** *** *** ********:

******** *** "*****" ****** **** ***** *** ******** ** ***** for ******* ******** *** ******* *** ****** ** *******:

******* ******** *** ********* **** *** ********** **** *************:

*.******* **** ******* * *** ******** ****** ** ***** *** issue ** *** ******* ****. *** ****** ******* **** ** ********.

*.******* **** ******* *** ***** ******** *** ******* ******** ** Nov. ****.

*.******* **** ******* * *** ******** ** *** ** ******** which **** *** * ******* *** *** ****** *** ***** security ************** *** **** ***** ******** ****.

*** *** ****** **** *** ******* ** ******** **** *** impacted ** **** *************, ** **** ******* ** ******** ********* simultaneously **** ** ******* *** *** ********.

** ** *** ******* ******* *** ******** ** **** ************* before ** ********* ****, *** **** **** ********** ** ** once **** ***** ** *** *****.

OEM *****

**** ************* ***** ******* ******* ** *** ***** ********** **** relying ** *** *************. ******* ****** ****** ** ******* ** a *** ** **** ***** ** *** ******* ***** ***** units **** ****, *** **** **** ****** ** ***** ***** due ** *** *************. *******, ***** ********** **** ********** **** may **** *** *** *******. ******* **** ***** ******** **** affected ********* ******* **** *** *** *** ** '*********' ******* product, *** **** ******* ** ****** ******* ** ******* ** resolve **** *****.

***** ** *******'* ******* ******** *** ******** *******, ** ** clear **** *******'* ******* ******* ** ****** ***** *** ***** before ********** **** *** *** *** ********. ******* ************** *** been **** ********** **** ***** *** ********* **** **** *** similar *************** ** *******, ******* **** *** ********* *** ***** 2nd ******** **** *** *** **** ***** ******* ***** ***** own ***** ** *** **** *******.

Comments (36)

**** ******* ** ******** ********* ***** (*** ******) ****** *** vulnerability ******** *** ******* ********* ******.

** * ****** ********** ** ******* ********, **** ** ** great *******. **** * **** **** *******, * *** ** operations ******* ** **** ** *** **** ********** *** **** tests ** *** ** *** ******* ******* ********* **** ** sell **** **********. ** **** *** **** **** ** ********* this *************. *** * ****** **** *** **** ****** ********** are *** **** *** *******?

**** -

**** *** *** ** *** * ****? **** *** *** you ***** *** ********* **, **** ********?

******* ********** ********* **** ******* **** **** **** *** ******* OEMs, *** ** ****** ** *** ******, *** *** ******* specific ****** ********.

** *** *** ***** **** ****/********** ******* *** *****/******** ** might **** ****** ** *********** ***** ***** *** ********** ** not.

* **** ****** * *** ***** ** *** **** *** Shodan ****** *** *** * ***** **** ** *** ***** units ***** ******* ** *** ******* ******* **** ******** ** read *** ****** ********, **:

****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*}

******* **** **** ** *** **** **** ** *** ************* (if *** ****** *** *** ****** ******** **** *** ****, you ****** ******* ** **** **** ******).

*** *** *** ** *** *** * ***** **** ** a ******** * *** **** ** ******* * ******** **** from - ****** *****:

***-***-**:********* ***$ ./*******.**
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** *** *** ******** ****.
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"
*******...
***** ********:
"*************": "********************************"

* ***** ** ******* **** **** ***** # *** ******** build *** ** *** ****** *** *** ******** **** **** from *** ******.

** **** **** ** ***** ******* **** *** ***** ***** right *** ** ******* *** ***** *** ****** ******. * will *** **** **** ***.

***** ********:
"*************": "********************************"

** *** *** * ****, ****** **, ** ***** *** websites ********** ******* ****** ****** *** ****** ** ****** ********* with ********* ******* **********. *** ********, ******** "********************************" **** *****'* **** *****, **** **** *** "******" (****** using ***) ***** ** ******** *** **** ********.

** ** ***** **** **** *** **** ******* *** ****** of *** ********. **** ****** ** ***** ****** ****** ** a *******.

***, **** *****. * ******* ******* **** ***** ******* ****** to *** *** **** ***** *** ****** ******* **** ******* with **** ************* *** ******* ** **** ** **** *****. But ** *** **** *** * **** ******** **** ******* even **** ****/**** ** *******.

******, **'* **** * **** ** ********** **** **** ** the ****** *******. **'* *** ****** * *** ********* ********* for ***** *******, ******* *** ****** * ****** ***** *** company ** ***** *** ********* *********. ********* *** ******* **** hacked *** **** **** **** *********** *** **********.

*'** ***** ******* ** ***** ******** ***** ****** *** ** will *** ****.

*** *** ***** ** ** **: ******@****.***

***** ** *** *** ********

**** ******* ** ******** ********* ***** (*** ******) ****** *** vulnerability ******** *** ******* ********* ******.

**** *** *** ****?

** ***** * **** ** ***** ******* ****?

***********, **** *** **-******.

**** ** * **** ** *******'* ******* ***** ***** *** are ***** ****** *********** ** *******. ** ** *** *** at **** ****, ** **** **** ******* ******* ********. *** question *** *** ***** *** *******:

****://**.*******.***/********/*******/********/*************/

*** **** *********** **** ** *** ***** ******* ** **** 'szUserName' ** ****, *** *** ******* ** ***** *** "*****".

****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*}

* ****** *** '****' **** *** **** **** *** ************** mechanism ** '*******' *** **** ** **** ** **** *** sensitive **** **** ***** **********...

*** **** ** ** ** **** ***** **** *****? ** if *** *** * **********, *** **** ** ** ** know **** ** * ****? *** *********** ** ****?

****'* *** *****. ** ***-******** *** * ******** ****. **** in * ***** ** **** ** ****** ****** ** *** their **** ***** **** *******. **** * **** ** ******** Dale *** ******, * **** **** * **** ** ***. When ** ******** ***** **** ******, * ****** ****, ***** all *** ***** ** ** ***, **** *** *****, *** ensure ** ******* *** *******.

* **** ***'* ******* *** * *** ******* ******* ***** have ***** ******.

** ** *** *** * **********, *** **** ** ** to **** **** ** * ****? *** *********** ** ****?

** ** **********, ** ** ****** *********** ** *****, *** partly **********.

** **** ***** * ********* ***** ** ***** **** ** required ** ***** ****** ****, *.*. ******* * **** **** as**** ***. ** **** ***'* **** *** ****** ** ****** ***** own *********, **** ****** ******** ***. ** *** ********, *** insecure **** * ********* ****** ** ****** ** ** ******** to *** ******** *.*. ******* *********** ***'* **** ** **, that's *** ****, ** ** * *********** **** ** ******* skill **** **** ***'* ****.

** *** **** * ********* ***** ** **** * ******* resistant ** ******* ****** ***** ******* **** ** ********** **** any ******* ********. ** ** **** ********, ** *** **** like **** *** *** ******* *** **** **** ****** **** time. ** **** **** ******, **** **** ** **** ** features **** ***** ******, ********, *** ***** *** ******** *** and *****. ********, ******** *** ***** ******** **** ***** ******, CEOs *** *** ** ** ***** ******** **** **** ****** priority ** ***** ** ******** **** *** ** ****** ** bullet ****** ** ********* *********.

** ** *** *** * ******** ******* ***** ******** ** important, *** **** ** *** ******* ** * ************* *********, or **** *** ******* ***** ***** *** ******* *** ***** with ** ** * ********** *****.

* ****** *****, *** ** **** ******* ***** *** ******* / **** ******* *** ********** *** **** ****** ******* ********* on * ******* *****.

** * ******* ** *** *********** ** ********** ** ******* until ** ** **********

*** **** ** ** ** **** ***** **** *****?

*** ** ****, *** **** **** ** ***** **** **** reading *** *** ** ********** *** ****

** ** *** *** * **********, *** **** ** ** to **** **** ** * ****?

*****, ********* *** *** ******* - ***** *** ** *****, this ** *** *** **** ** ******* *** *** *** portable ** ** '*****'

*** *********** ** ****?

******** *** ****** *** *** *********** *** *** ** ** there

* **** ***'* ******* *** * *** ******* ******* ***** have ***** ******.

*************, * ***** *** **** **** ** *** **** ** this *** * *****....

**** *** *** * *** **** ******** *** (** *'* curios), *** * ******** ***'* ***** ******* **'* * ********, it's ***** **** **** - **** **** ********** ** ******** whatsoever.

*** ** ***** *** **** ****** **** '******()', *** ** sanitation ********** ** **** ******** *****, ***** ***** **** ****** code ********* (***) **** **** *********.

* ******* ***** *** ********, *** ******* ****** **** ** absolutely ******.

* ******* ***** *** ********, *** ******* ****** **** ** absolutely ******.

*** **** *** ** ******** ************...

******** **** ******** ** ***, ******** * **** ***** ** who ****** ***.

*** ***** **** **, ** *** ** **** *****? (********** I ******* ***** ****** ** ****)

***** ****'* ****** *** ***** ****, ** ***.

****:

***** *** **** *** *** **** **** **** ********:*****://******.***/*****/***-*********-***

******** **** ******** ** ***, ******** * **** ***** ** who ****** ***.

*********, ***** "******" ******** ;)

* ******* ***** *** ********, *** ******* ****** **** ** absolutely ******.

* ******* *****'* ***** * *** ** ****** *** *****. About * **** ***, * *********** * ****** **** ********** ignored *** ******** *** ******** **** ********** *** ****. * told **** ***** *** *******, **** ****** **, * ********* and **** ********** ****** ** *** **. **** ****'* ****** overly ********* ***** *** ******* ** ***.

** *** ***, *** ******** *** **** ******** **** ** both *** ******* ******** *********** *** **** ****** ********, *** reached *** ** *** ******* ******** ********** ** ***** ******. I'm **** **** *** ******* *****, *** *** **** **** in **** **** ***** *** ****.

*** ** *** *** ***** *** ******** ** ***** **** the *** * ******* *************.

** ** ****** ***** ** ***** ***'* **** ** ** published?

***** ** ** **** ** *** ***** **** ***** *********** in ***** **** ** **** **** **** *** *** *** 3, **'* * **** *** ***** *** *** ** **** less ****** ******* ******* *** **** *** *****.

***** **** ****** ** *** ******* * ***** *******, *** has **'* *** ***** ******** ********, *** * *** *** I *** **** ***** **** * *** ** ******** ******.

**** ****** **** ********* **** **** ****** ****** **** *** PostMan ********, ***** *** ** * *** ******* ** *** are *** **** ** ******* **** **. * ***** * little **** ****** **** ***** ******, *** ******** *** *** do **** *** **** *** ******* *** *** ******* ******** fancy.

*** ***** ** ****/*******:

*) *** *** ***** ******** ****: ****://**.***.**.**:****/***-***/****-***?****={"***":***,"**************":"*****","**********":"","******************":*}

*) *** ** ** ***** ** * ******* ********: ****://**.***.**.**:****/***-***/****-***?****=*&**********=*****&************=***********************

**** ******/******. * **** ******** **** ****** ** * *** random ****** *******.

[**** ****: ****** ** * ******* *******.]

****** **** ** ****** ** ** ** ** ******** *********** on *** ** ******* ** ******* *** ** ********* ***** people's ********** ******* ******* **********???

* *** **** ******* ** **** ** ****. * **** said "****" ** ** **** ** ***** **** ** ***** it ** **** ****** *******.

[**** ****: ****** ** * ******* *******.]

**, *********** ***** *** ********** ****** *** ***.

*** *******, **** #* ******** ******* *** *** ****** ***** be **** *******, *** ********* ******* *** ************* ** *****.

**** #* ** *** *********.

**** ********** ** **** ****:****** * **** **,*** ***** *******?

**** ** ****** ** *********** *** **** *********** ** **** is ********* ** *** ******** ********* ***.

*** ******* ** **** ****** ** ** ***** ******* *** may ***, ****, *******, ** ******* ******* ********* ** ********* if ***** ******* *** ********** ** **** **** *** *** appropriately ** ***** ** ****** ****.

** *** ********* *** ************ **** ****** *** **** **** for *** **** ** ******* ********.

* ******* **** ********* ** ** ********* ******** ****, *** do *** ****** ***** **** **'* ********** *** *********** ** provide * ***-***-********* (**?) ******* ** *** ** ******* ****? While *'* **** **** ****** **** **** *** **** ** the ****** ** ***** ** *** ********, **** ******* **** it ***** **** *** ***** ***** *** ****** ***** ******* in ** ***** ****** *** ***** ********* ******* *** ******** them *** ***** ** ** **? ***** **** *** ** effectively *** **** *********** ********* ** *** ****** *** ***, you **** ***** ** ** * ****-****, ****-****** **** *** simplified ** ** **** ****** *** *** ** ****** ** seconds.

* ********** **** *******, ******* * ** *** ******* ** have ******* *** ***** ** ****** *** ***** **** ** use **** ************* (** ****** ** **** ********* ******* *** other *********) **** *** ********* **** ***** *** ******* ****** figure *** ** ***** ***. **** ** ** ********* ****** exploit, **** ** *** ***** ******* *****. *** **** *******, passing **** ******** ****** ** ** **** ****, ** ****** as ****** ** ** **** (*** **** *** **** **** complex ************'* ***** ****** ********).

*** **** **** ** **** ** **** ** *** ******* been ***** ** **** ************* **** ** ** ** *** make ** ********** ***** *** **** **** ** ***** ******** are, *** **** ******* *** ******, *** *** ************ **** expose ** ******* **** **** **** ** **** ** **** risky **** **** ****** ***. **, ****** **** ** ** and ***** "**** ***'* ****** ** **, ** ***** *** much ****** ** ****** **** ***."

[******]

******* *** ***** ********* ******* ******** *** **** *************. ********* to *** *******, *** ******* *** ** *****/******* ** ** use *** ********'* *****-** ***** ******* *****. **** *****->*********** ***** should ** * "*****" ****** ** ***** *** *** ********:

******** *** "*****" ****** **** ***** *** ******** ** ***** for ******* ******** *** ******* *** ****** ** *******:

** ******* ****** **** ******** *****?!?! *************!
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Spring 2019 IP Networking Course on Jan 10, 2019
You can register for the Spring 2019 IP Networking course here. This is the only networking course designed specifically for video surveillance...
Bosch VDOO 2018 Vulnerability on Dec 20, 2018
Security research firm VDOO has discovered a critical vulnerability in Bosch IP cameras. Inside, we cover the available details of this new...
Genetec UL Cybersecurity Certificate (2900-2-3) Examined on Dec 19, 2018
Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates? Earlier in 2018, a...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...
Genetec Takes Aim At 'Untrustworthy' 'Foreign Government-Owned Vendors' on Sep 24, 2018
Genetec is taking aim at 'untrustworthy' 'foreign government-owned vendors'. This is not a new theme for Genetec as nearly 2 years ago, Genetec...
Hikvision FIPS 140-2 Cybersecurity Certification Examined on Aug 27, 2018
A week after the US government passed a law banning Hikvision, Hikvision announced it had obtained a FIPS 140-2 certification from the US...
Sony Gen 5 IP Cameras Critical Vulnerabilities on Jul 26, 2018
Cybersecurity vulnerabilities remain prevalent in video surveillance devices. Now Talos researchers have discovered multiple vulnerabilities in...

Most Recent Industry Reports

Outdoor Camera Mounting Hardware Guide on Feb 21, 2019
Mounting cameras outdoors can be challenging, requiring understanding different types of equipment and methods. In this guide, we teach this...
HID Favorability Results 2019 on Feb 21, 2019
HID favorability results were strong, in the 2019 IPVM integrator study of 200+ integrators, with a net +62% and low negativity as the table below...
First US State, Vermont, Bans Dahua and Hikvision on Feb 21, 2019
The first US state, Vermont, has issued a ban on a number of Chinese and Russian manufacturers including the world's 2 largest video surveillance...
ADI 'SAVE BIG' On FLIR And Hikvision Examined on Feb 20, 2019
One is a major US defense supplier. The other is owned by the Chinese government. But you can "SAVE BIG" on both at ADI. In this note, we...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry. We originally reported on them in 2015. At the...
Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Sales Cuts At Rasilient on Feb 19, 2019
Over the past 2 years, video surveillance storage specialist Rasilient has expanded its workforce significantly, aiming to build its own branded...
Exacq Raises VMS Software Pricing Twice in Less Than a Year on Feb 18, 2019
Most VMSes regularly release new features, but rarely increase their prices. For the 3rd time in 4 years, and 2nd time in 8 months, since being...
Axis IR Multi Imager Camera Tested (P3717-PLE) on Feb 18, 2019
Axis has released their first IR multi imager, the P3717-PLE, a repositionable model listing 360° IR illumination and flexible positioning,...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact