Vivotek Remote Stack Overflow Vulnerability

By: Brian Karas, Published on Nov 14, 2017

A stack overflow vulnerability in Vivotek cameras has been discovered by bashis, the security researcher who has also found vulnerabilities in cameras from Axis and Dahua, among other brands. The vulnerability is very easy to exploit, and opens up a variety of ways for attackers to impact affected cameras from Vivotek.

Details of the vulnerability have been made public, after Vivotek failed to provide agreed-upon responses to bashis during the initial disclosure process.

In this report we analyze the vulnerability, and Vivotek's handling of it that caused details to be released prior to patched firmware being fully available.

* ***** ******** ************* in ******* ******* *** been ********** ** ******, the ******** ********** *** has **** ***** *************** in ******* ****************, ***** ***** ******. The ************* ** **** easy ** *******, *** opens ** * ******* of **** *** ********* to ****** ******** ******* from *******.

******* ** *** ************* have **** **** ******, after ******* ****** ** provide ******-**** ********* ** bashis ****** *** ******* disclosure *******.

** **** ****** ** analyze *** *************, *** Vivotek's ******** ** ** that ****** ******* ** be ******** ***** ** patched ******** ***** ***** available.

[***************]

Vulnerability ********

**** ******* ** *** vulnerability **** *************** ** ****, *** ********' ****** *******. *** ************* ****** on ********** ******* **** to ****** ************* ** ******* ** their ****** *****. * specially-crafted **** ** *** URL ******** *** ************* when *** *** ******** data ** ****** ** what *** ******'* ********* expects. ********* *** **** able ** *********** ********* memory *********, ***** *** cause *** ****** ** crash, ** ** ******* arbitrary ****.

Very **** *******

** ******* ********, *********, or ******-******** *******/****** *** required ** ******* ** exploit ******* ** ******** camera. ****** ******* * long *** **** *** malicious *******, ** ***** in ******' *****-**-*******, *** trigger *** ********. **** makes ** ********* **** to ******** ******* **** this *************.

Affected ********

********* ** ******' ********, the ********* ****** *** have ******** **** **** vulnerability:

******, ******, ******, ******, FD8166A, *******, *******-*, *******, FD8167A, ********, ********, *******, FD8169A, *******, ********, ********, FD816B, ******, *******, *******, FD816C, ******, *******, *******, FD816D, ******, ******, ******, FD8182, ******-**, **********, *******, FD8367A, *******, *******, ******, FD836BA, ******, ******, ******, FD8382, ******, ******, ******, FD9381, *********, *********, ******, FE8374_v2, *********,******, ******, ******, FE9382, *******, *******, ******, IB836BA, ******, ******, ******, IB8382, ******, ******, ******, IP9171, ******, ******, ******, MD8564, ******, ******, ******, SD9362, ******, ******, ******, SD9366, ******

*** ************* *** ** present ** ***** ******* products ** ****, ******* is ** ******* ** verifying ***** ****** *** affected.

Firmware ******* ********

*******'* ******** ** *** initial ************* ********** ********** indicates **** ******** **** start ** ****** ********* on ******** ****:

***** *** ******** *** updated ** *** ********* affected ****** ******** ** November **** *** ******** 24th.

Risk ******

***** ** *********** ********* by ******, ** ** unlikely **** ************* *** be **** ** **** access ** * ***** shell, ** ** ****/*** external ****. ***** ** to ***** *** ****** to ****/****** ** *** most ****** ********, ***** could ** **** ** a **** ** ****** of ******* ****** ** the ******.

Vivotek ****** ********

*** ***** ** ****** outlined ** ****** ** his *********** ***** **** while ******* *** ********* responsive, *** ******* *** not ******* ** ** email **** ******, ***** prompted *** ** ******** the ************* ********, ** initially ****** ****.

** ** ***** ** IPVM, ******* ************ *** lack ** ************** ** their ****, ******* **** had ******** ** *** for ********** **** ** complete ******* ** *** firmware.

Disclosure ***** ************ ************

***** ****** ***** **** chosen ** **** ** disclose *** *******, ******* that ******* *** ********** to *** *************, ** was ***** ** ********** to ** **. ** these *********, ************* *** at * ************ ******** to ******** ***********, *** upon *********** *************** *** effectively ******* *** ***** of *** *** **** the ************* **** ** disclosed.

***** ************* *** ****** to *** **** ********** as * ******** ** training ********** *** ***** internal *****. ******* ********* processes, *** ******, ** ensure ***** ** ************** are **** **** **** researchers ** ***** ** minimize ******* ** ************* disclosures ********* ****** **** are ***** ******** **** updated ********.

Comments (11)

******* *** **** ******** *** ****** ******** *** ** ****** models *** **** ************* *****. ** ********* *** ***** ** update *** ******** ****. (***** *** *** ***** **** ****:****://********.*******.***/************/*******/*****-********/*******-*****-********-********-******-*****-********-**-***-******.***). ** ******* **** ** *** ********* ** ******* ******** and **** ***** ******** ****** ** *** ********* *** ******* products

*** ***** ** ****** ******** ** ****** ** *** *********** claim **** ***** ******* *** ********* **********, *** ******* *** not ******* ** ** ***** **** ******, ***** ******** *** to ******** *** ************* ********, ** ********* ****** ****.

* ***** ********** ***** ********, * *** *** ***** **** ** ********* ********** ** manufacturer ******, ****** ******* ** *** ***’* *** *** **** what ** *****.

****** ** **** ** **** *** **************** *** ***** *** ******, **** ** *** **** ***** **** ** less, ** ******** ****.

** *** ***** ***** ******* ** ** * *** **** careful, *** ***** *** **** ***** ** ******* ******* ** be ****** *** ** ******* ****.

********, * **** **** ******** * ** ******** ** ********* FD ** ** *** ****, ** **** ********** **** (************ to *** ******, ** ******).

* ****** ***** ** *********** **** ** **** ***** ** after ******* ******* ** ******, *** * ** ***** ******** for *** ** ****, *** *** *** ******** *** *** to ** ****, ** ***** *** ****** **** ****** ** and ******* *****.

**, * ***'* **** *** *** ***, *** * ****** don't ****, *** ****** ******** *** ***** - * ***** choose ** *** ******** ********, *** **** ** *** ******.

** *** ***** ***** ******* ** ** * *** **** careful, *** ***** *** **** ***** ** ******* ******* ** be ****** *** ** ******* ****.

* *** ****, ******* *** ******* ***** **** *****, ***** gives *** ********** **** *** **** ***** **** ******* ***** have ***** **** ****:

***** ****** ***** **** ****** ** **** ** ******** *** details, ******* **** ******* *** ********** ** *** *************, ** was ***** ** ********** ** ** **.

******** **** ** ********, * *** ********* ** *** *** so ******* **** ** ** ********* **** ***.

***** *** **** *** **** ***** ** **** *********

********, * **** **** ******** * ** ******** ** ********* FD ** ** *** ****, ** **** ********** **** (************ to *** ******, ** ******).

*******, **** ** ***** ** ******* ** *** ** **** actually ***** ***** ** *** **** ******, *** ** ****** how ********* * **** **, * ***** *** **** *** circumstances ****** *** ******** ** *** ****.

****, *'* *** ******* **** ****** ****** **** ***.

* ***'* **** * **** ***** *** *** **** ********, and ** **** * ***'* **** ** *** ***** ** Mr. ***** ** **. *****, **'* **** **** *******, *** mine.

**** ** *** ***** ** ****;

* ***** ** *** ***** *** **** ****, **** ** FD *** ** ****** *************, * ***** **** ** *********** and *** ***** **** *****, ***** *** **** ***** **** me *** **** ** **** **** ***** *********. *** * choose *** ** ** **, * ****** ** **** **** public ** **** *** *** **** **** *** *******.

** **** **, **** ** *** ********** ****** - **** eyes ** ****** ****?

****, *'* *** ******* **** ****** ****** **** ***.

********* ******?

* ****’* ********* *** ** **** ******* ** *** ***. I *** **** ****** * ****** ********, ** *******, “** your ** **** ******** ** ** ** **** ** ***********?”

* **** *** **** ******* *** **** **** ** ******* to *** **** ** **** ************.

/**** * **** ***.

**** ******.

*'* ****** **** ** ****** ************.

**** ****** * ********* (****: *** *******!), * ******** ***** specifically ** **** ***** ***** **** ** **** **** **** (after ** * ******* ** ****), ***** *** ** *** 15+ *************** *** **** **** ****** - *** ********, *** they **** "****** ** *** ** *******", ** ***** * respond "**, * ***** ** ********, **** *** **** *** February".

*** ******** ***'* *****, *** **** ** *** ***** ******** as ** *****.

*******, ** ***** ** ****** ************* **** *** ****** ****** 1st ********, **** ** * ***** ** **-*********, ***** **** for **** ** ** ** *** ****** ****. (* **** not *** ****** ** **-********* *******).

**** * **** ***

/******

* ******* ** ** ********* **** *** *************** *** *********, and **** ***********, **** ******* ** ***** *** *** ******* released * *** ******** *** **.
******* ************ ** *******, * ** *** **** *** ** does *** **** ** **** ***** ** *** *********, *********** more ******* *********.
** **** ** ***** *** **** *************, *** ******* ** one ** ****.
**** ***** ****, *******, ********, ***** (** ***..****), ********* (** OEM ... ****) .. ***, *******, ********..*********. *************** ** *** comments *** *** ****.

****** **** - ********** *******

“**** ******* ************ ******* ************ ******* ****, ********, *****, *********, ISS, *******, *********”

“*******?”

“****** ****”

“****** *** ****** ** ****”

**** ********** ... ***, * ****** ***** **** ... *** I ** *** ***** **** ** *** ******, * ***** it's ***** *** ****.
*** ** *** **** ******* ** *** ***** *** ****, I ***** *** ****** ***** ******** **** ****, *** **** know *** ********.

******* *** ******** *** ******** *** *** **** ** ** camera ****** *** **** ************* *****. ** ********* *** ***** to ****** *** ******** ****. (***** *** *** ***** **** here:****://********.*******.***/************/*******/*****-********/*******-*****-********-********-******-*****-********-**-***-******.***).

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Registration Closed - Spring 2019 IP Networking Course on May 02, 2019
Register now for the Spring 2019 IP Networking course here - Closed. Last chance now.   This is the only networking course designed specifically...
Locking Down Network Connections Guide on Apr 23, 2019
Accidents and inside attacks are risks when network connections are not locked down. Security and video surveillance systems should be protected...
Silicon Valley Cybersecurity Insurance Startup Coalition Profile on Mar 20, 2019
Many industry people believe cybersecurity insurance is not worth it, as the voting and debate in our Cybersecurity Insurance For Security...
Hikvision Favorability Results 2019 on Mar 18, 2019
Hikvision favorability results declined significantly in IPVM's 2019 study of 200+ integrators. While in 2017 Hikvision's favorability was...
Bosch VDOO 2018 Vulnerability on Dec 20, 2018
Security research firm VDOO has discovered a critical vulnerability in Bosch IP cameras. Inside, we cover the available details of this new...
Genetec UL Cybersecurity Certificate (2900-2-3) Examined on Dec 19, 2018
Proving a company is cybersecure has become a major concern for security companies. But how trustworthy are these certificates? Earlier in 2018, a...
No GDPR Penalties For UK Swann 'Spying Hack' on Nov 20, 2018
The UK’s data protection agency has closed its investigation into Infinova-owned Swann Security UK, the ICO confirmed to IPVM, deciding to take “no...
HID: Stop Selling Cracked 125 kHz Credentials on Nov 05, 2018
HID should stop selling cracked 125 kHz access control credentials, that have been long cracked and can easily be copied by cheap cloners sold on...
"New Zealand Govt Uses Chinese Cameras Banned In US", Considers Security Audit on Oct 12, 2018
Newsroom NZ has issued a report: "NZ Govt uses Chinese cameras banned in US": This comes after the US federal government banned purchases of...
China Hacks Video Servers Causing Uproar on Oct 05, 2018
An incident causing an international uproar is hitting home in the video surveillance industry as a Bloomberg report, "The Big Hack: How China...

Most Recent Industry Reports

Facial Recognition Systems Fail Simple Liveness Detection Test on May 17, 2019
Facial recognition is being widely promoted as a solution to physical access control but we were able to simply spoof 3 systems because they had no...
Inside Look Into Scam Market Research on May 17, 2019
Scam market research has exploded over the last few years becoming the most commonly cited 'statistics' for most industries, despite there clearly...
Maglock Selection Guide on May 16, 2019
One of the most misunderstood yet valuable pieces of electrified hardware is the maglock. Few locks are stronger, but myths and confusion surround...
Panasonic 32MP Multi Imager Camera Tested (WV-X8570N) on May 16, 2019
Panasonic has released their first multi imager models including the 32MP (4x4K) WV-X8570N, claiming "Extreme image quality for evidence capturing...
Trump Signs 'Huawei Ban' - Executive Order Targeting Foreign Adversary Technology on May 16, 2019
US President Donald Trump has signed an executive order targeting technology provided by 'foreign adversaries', in what is widely being called a...
Bank Security Manager Interview on May 15, 2019
Bank security contends with many significant threats - from fraudsters to robbers and more. In this interview, IPVM spoke with bank security...
Milestone XProtect 2019 R1 Tested on May 15, 2019
For the past few years, Milestone has released quarterly software updates XProtect VMS platform. What is new and how much impact do the updates...
San Francisco Face Recognition Ban And Surveillance Regulation Details Examined on May 14, 2019
San Francisco passed the legislation 8-1 today. While the face recognition 'ban' has already received significant attention over the past few...
Security Fail: ASISNYC Auto Emails Passwords In Plain Text on May 14, 2019
ASIS NYC automatically emails a user with the password the user just entered, in plain text, when one registers for the site / event, as the...
Hikvision VP On Muslim Oppression on May 14, 2019
Hikvision has won tens of millions of dollars, at least, in direct contracts with the Chinese government that oppresses Muslims, including a forced...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact