Vivotek Remote Stack Overflow Vulnerability

Author: Brian Karas, Published on Nov 14, 2017

A stack overflow vulnerability in Vivotek cameras has been discovered by bashis, the security researcher who has also found vulnerabilities in cameras from Axis and Dahua, among other brands. The vulnerability is very easy to exploit, and opens up a variety of ways for attackers to impact affected cameras from Vivotek.

Details of the vulnerability have been made public, after Vivotek failed to provide agreed-upon responses to bashis during the initial disclosure process.

In this report we analyze the vulnerability, and Vivotek's handling of it that caused details to be released prior to patched firmware being fully available.

* ***** ******** ************* ** ******* ******* *** **** ********** by ******, *** ******** ********** *** *** **** ***** *************** in ******* ****************, ***** ***** ******. *** ************* ** **** **** ** exploit, *** ***** ** * ******* ** **** *** ********* to ****** ******** ******* **** *******.

******* ** *** ************* **** **** **** ******, ***** ******* failed ** ******* ******-**** ********* ** ****** ****** *** ******* disclosure *******.

** **** ****** ** ******* *** *************, *** *******'* ******** of ** **** ****** ******* ** ** ******** ***** ** patched ******** ***** ***** *********.

[***************]

Vulnerability ********

**** ******* ** *** ************* **** *************** ** ****, *** ********' ****** *******. *** ************* ****** ** ********** ******* **** ** ****** ************* ** ******* ** ***** ****** *****. * *********-******* **** or *** *** ******** *** ************* **** *** *** ******** data ** ****** ** **** *** ******'* ********* *******. ********* are **** **** ** *********** ********* ****** *********, ***** *** cause *** ****** ** *****, ** ** ******* ********* ****.

Very **** *******

** ******* ********, *********, ** ******-******** *******/****** *** ******** ** execute ** ******* ******* ** ******** ******. ****** ******* * long *** **** *** ********* *******, ** ***** ** ******' proof-of-concept, *** ******* *** ********. **** ***** ** ********* **** to ******** ******* **** **** *************.

Affected ********

********* ** ******' ********, *** ********* ****** *** **** ******** with **** *************:

******, ******, ******, ******, *******, *******, *******-*, *******, *******, ********, FD8167AS, *******, *******, *******, ********, ********, ******, ******, *******, *******, FD816C, ******, *******, *******, ******, ******, ******, ******, ******, ******-**, FD8365A_v2, *******, *******, *******, *******, ******, *******, ******, ******, ******, FD8382, ******, ******, ******, ******, *********, *********, ******, *********, *********,******, FE9182, ******, ******, *******, *******, ******, *******, ******, ******, ******, IB8382, ******, ******, ******, ******, ******, ******, ******, ******, ******, SD9161, ******, ******, ******, ******, ******, ******, ******

*** ************* *** ** ******* ** ***** ******* ******** ** well, ******* ** ** ******* ** ********* ***** ****** *** affected.

Firmware ******* ********

*******'* ******** ** *** ******* ************* ********** ********** ********* **** firmware **** ***** ** ****** ********* ** ******** ****:

***** *** ******** *** ******* ** *** ********* ******** ****** starting ** ******** **** *** ******** ****.

Risk ******

***** ** *********** ********* ** ******, ** ** ******** **** vulnerability *** ** **** ** **** ****** ** * ***** shell, ** ** ****/*** ******** ****. ***** ** ** ***** the ****** ** ****/****** ** *** **** ****** ********, ***** could ** **** ** * **** ** ****** ** ******* attack ** *** ******.

Vivotek ****** ********

*** ***** ** ****** ******** ** ****** ** *** *********** claim **** ***** ******* *** ********* **********, *** ******* *** not ******* ** ** ***** **** ******, ***** ******** *** to ******** *** ************* ********, ** ********* ****** ****.

** ** ***** ** ****, ******* ************ *** **** ** communications ** ***** ****, ******* **** *** ******** ** *** for ********** **** ** ******** ******* ** *** ********.

Disclosure ***** ************ ************

***** ****** ***** **** ****** ** **** ** ******** *** details, ******* **** ******* *** ********** ** *** *************, ** was ***** ** ********** ** ** **. ** ***** *********, manufacturers *** ** * ************ ******** ** ******** ***********, *** upon *********** *************** *** *********** ******* *** ***** ** *** and **** *** ************* **** ** *********.

***** ************* *** ****** ** *** **** ********** ** * learning ** ******** ********** *** ***** ******** *****. ******* ********* processes, *** ******, ** ****** ***** ** ************** *** **** open **** *********** ** ***** ** ******** ******* ** ************* disclosures ********* ****** **** *** ***** ******** **** ******* ********.

Comments (11)

******* *** **** ******** *** ****** ******** *** ** ****** models *** **** ************* *****. ** ********* *** ***** ** update *** ******** ****. (***** *** *** ***** **** ****:****://********.*******.***/************/*******/*****-********/*******-*****-********-********-******-*****-********-**-***-******.***). ** ******* **** ** *** ********* ** ******* ******** and **** ***** ******** ****** ** *** ********* *** ******* products

*** ***** ** ****** ******** ** ****** ** *** *********** claim **** ***** ******* *** ********* **********, *** ******* *** not ******* ** ** ***** **** ******, ***** ******** *** to ******** *** ************* ********, ** ********* ****** ****.

* ***** ********** ***** ********, * *** *** ***** **** ** ********* ********** ** manufacturer ******, ****** ******* ** *** ***’* *** *** **** what ** *****.

****** ** **** ** **** *** **************** *** ***** *** ******, **** ** *** **** ***** **** ** less, ** ******** ****.

** *** ***** ***** ******* ** ** * *** **** careful, *** ***** *** **** ***** ** ******* ******* ** be ****** *** ** ******* ****.

********, * **** **** ******** * ** ******** ** ********* FD ** ** *** ****, ** **** ********** **** (************ to *** ******, ** ******).

* ****** ***** ** *********** **** ** **** ***** ** after ******* ******* ** ******, *** * ** ***** ******** for *** ** ****, *** *** *** ******** *** *** to ** ****, ** ***** *** ****** **** ****** ** and ******* *****.

**, * ***'* **** *** *** ***, *** * ****** don't ****, *** ****** ******** *** ***** - * ***** choose ** *** ******** ********, *** **** ** *** ******.

** *** ***** ***** ******* ** ** * *** **** careful, *** ***** *** **** ***** ** ******* ******* ** be ****** *** ** ******* ****.

* *** ****, ******* *** ******* ***** **** *****, ***** gives *** ********** **** *** **** ***** **** ******* ***** have ***** **** ****:

***** ****** ***** **** ****** ** **** ** ******** *** details, ******* **** ******* *** ********** ** *** *************, ** was ***** ** ********** ** ** **.

******** **** ** ********, * *** ********* ** *** *** so ******* **** ** ** ********* **** ***.

***** *** **** *** **** ***** ** **** *********

********, * **** **** ******** * ** ******** ** ********* FD ** ** *** ****, ** **** ********** **** (************ to *** ******, ** ******).

*******, **** ** ***** ** ******* ** *** ** **** actually ***** ***** ** *** **** ******, *** ** ****** how ********* * **** **, * ***** *** **** *** circumstances ****** *** ******** ** *** ****.

****, *'* *** ******* **** ****** ****** **** ***.

* ***'* **** * **** ***** *** *** **** ********, and ** **** * ***'* **** ** *** ***** ** Mr. ***** ** **. *****, **'* **** **** *******, *** mine.

**** ** *** ***** ** ****;

* ***** ** *** ***** *** **** ****, **** ** FD *** ** ****** *************, * ***** **** ** *********** and *** ***** **** *****, ***** *** **** ***** **** me *** **** ** **** **** ***** *********. *** * choose *** ** ** **, * ****** ** **** **** public ** **** *** *** **** **** *** *******.

** **** **, **** ** *** ********** ****** - **** eyes ** ****** ****?

****, *'* *** ******* **** ****** ****** **** ***.

********* ******?

* ****’* ********* *** ** **** ******* ** *** ***. I *** **** ****** * ****** ********, ** *******, “** your ** **** ******** ** ** ** **** ** ***********?”

* **** *** **** ******* *** **** **** ** ******* to *** **** ** **** ************.

/**** * **** ***.

**** ******.

*'* ****** **** ** ****** ************.

**** ****** * ********* (****: *** *******!), * ******** ***** specifically ** **** ***** ***** **** ** **** **** **** (after ** * ******* ** ****), ***** *** ** *** 15+ *************** *** **** **** ****** - *** ********, *** they **** "****** ** *** ** *******", ** ***** * respond "**, * ***** ** ********, **** *** **** *** February".

*** ******** ***'* *****, *** **** ** *** ***** ******** as ** *****.

*******, ** ***** ** ****** ************* **** *** ****** ****** 1st ********, **** ** * ***** ** **-*********, ***** **** for **** ** ** ** *** ****** ****. (* **** not *** ****** ** **-********* *******).

**** * **** ***

/******

* ******* ** ** ********* **** *** *************** *** *********, and **** ***********, **** ******* ** ***** *** *** ******* released * *** ******** *** **.
******* ************ ** *******, * ** *** **** *** ** does *** **** ** **** ***** ** *** *********, *********** more ******* *********.
** **** ** ***** *** **** *************, *** ******* ** one ** ****.
**** ***** ****, *******, ********, ***** (** ***..****), ********* (** OEM ... ****) .. ***, *******, ********..*********. *************** ** *** comments *** *** ****.

****** **** - ********** *******

“**** ******* ************ ******* ************ ******* ****, ********, *****, *********, ISS, *******, *********”

“*******?”

“****** ****”

“****** *** ****** ** ****”

**** ********** ... ***, * ****** ***** **** ... *** I ** *** ***** **** ** *** ******, * ***** it's ***** *** ****.
*** ** *** **** ******* ** *** ***** *** ****, I ***** *** ****** ***** ******** **** ****, *** **** know *** ********.

******* *** ******** *** ******** *** *** **** ** ** camera ****** *** **** ************* *****. ** ********* *** ***** to ****** *** ******** ****. (***** *** *** ***** **** here:****://********.*******.***/************/*******/*****-********/*******-*****-********-********-******-*****-********-**-***-******.***).

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Hikvision Removed From US Army Base, Congressional Hearing Called on Jan 12, 2018
Hikvision has been removed from a US Army Base and a US congressional committee is planning a hearing on cybersecurity risks and specifically,...
Hikvision Declares 'Never Click On Links In Emails' on Jan 09, 2018
Hikvision is stepping up its cybersecurity efforts with a clear recommendation - to never click on links in emails: It is a surprising change...
Hacked Hikvision IP Camera Map on Dec 18, 2017
The interactive map below shows a sample of hacked and vulnerable Hikvision IP cameras across the USA. Hover over a marker to see an image from...
Broken Hikvision App Exposes Hypocrisy on Dec 06, 2017
While Hikvision talks about a commitment to cybersecurity, their broken app and their insecure 'solution' exposes not only their engineering...
Hikvision UPnP Hacking Risk on Dec 04, 2017
Hikvision IP cameras are being hacked even for end users who had not set up port forwarding and believed their cameras were 'safe' behind...
Dahua Forbes 'Next Web Crisis' Vulnerability Dispute on Nov 16, 2017
The buffer overflow vulnerability in Dahua products is not in dispute, in fact we covered it when it was first published. What is in dispute is...
WSJ Investigates Hikvision on Nov 13, 2017
The Wall Street Journal (WSJ) has released a detailed investigation into Hikvision's government ownership and cybersecurity problems, hitting the...
Hikvision Admits Backdoor 'PR Issue' on Oct 24, 2017
Hikvision is admitting a problem. The backdoor itself is evidently not the problem for them. The problem, according to Hikvision, is a public...
Uniview Recorder Backdoor Examined on Oct 20, 2017
A Chinese research group has identified a vulnerability in Uniview recorders that allows backdoor access in a method similar to the Dahua...

Most Recent Industry Reports

Vivint Streety Video Strengthens Door Knocking on Jan 17, 2018
Vivint is famous (or infamous depending on your perspective) for mastering large scale door to door selling. The company has skyrocketed from a...
Axis: "It’s A Question Of Trust And Who You Want To Be Associated With" on Jan 17, 2018
Who do you trust? Who do you want to be associated with? Axis is raising hard questions to start 2018. In this note, we examine these questions,...
Software House Vulnerability Allows Inside Attacker To Open Doors on Jan 17, 2018
A vulnerability in Software House IP-ACM modules allows an attacker to potentially unlock doors, or perform other actions, on affected systems....
'Defiant' Hikvision 'Strikes Back' At WSJ And US on Jan 16, 2018
The fight is on. Hikvision and their owner, the Chinese government, 'strikes back' against the Wall Street Journal and US politicians raising...
Camera Course - Last Day - Save $50 on Jan 16, 2018
Today is the last day to save $50 - register now. Learn video surveillance and get certified. Save $50 on the course, ending this Thursday the...
The 2018 Surveillance Industry Guide on Jan 16, 2018
The 300 page, 2018 Video Surveillance Industry Guide, covering the key events and the future of the video surveillance market, is now available,...
Edward Snowden Haven App Tested on Jan 16, 2018
Global coverage followed the December 2017 announcement that Edward Snowden was leading a team developing Haven, an app "that leverages on-device...
This High Schooler Is Excited About His Future Security Career on Jan 15, 2018
A common lament is that smart, young people have little interest in surveillance systems. In fact, discussions like Should Talented Young People...
"First Of Its Kind" Stove Knob Alarm Sensor (2GIG) on Jan 15, 2018
At CES 2018, 2Gig/Nortek announced the Stove & Grill Guard, a "first of its kind" sensor in the security industry, allowing users to be...
Amazon Deep Learning Partnership With AgentVi on Jan 15, 2018
Amazon is aiming to grow its Kinesis Video Streams offering that "enables you to quickly build computer vision and ML applications" in the cloud....

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact