Wrongly Accused Critical Vulnerability for Vivotek

Author: Brian Karas, Published on Jul 13, 2017

Vulnerabilities are an increasing branding and business problem for video surveillance manufacturers. However, sometimes vulnerabilities reported are not as critical as the reports claim.

Vivotek was recently faced with one but the vulnerability was meaningfully overstated. IPVM discussed this with the researcher who initially reported them and Vivotek, providing a more accurate assessment of the risks inside this report.

*************** *** ** ********** ******** *** ******** ******* *** ***** surveillance *************. *******, ********* *************** ******** *** *** ** ******** as *** ******* *****.

******* *** ******** ***** **** *** *** *** ************* *** meaningfully **********. **** ********* **** **** *** ********** *** ********* reported **** *** *******, ********* * **** ******** ********** ** the ***** ****** **** ******.

[***************]

Vulnerability *******

***-****-****** ****** ** * ******** ***** ** **.*, *** ********* a ************* ** * *** ****** **** *** ** ********* to ***** ** *************** ******** (*********) ** ******* ***** ******** as ****.***-****-****** ****** ** * *.*, *** ********* * ************* ** a ******** *** ****** **** *** ** ********* ** ***** an *************** ******** ** **** *** **** ** *** ******, including ****** ***** **** ** *** ******** ********.

Original ********** ** ******* **********

******* **, * ******** ********** ** ***** *** **** **** ** "Cursered" *** "************"********* ******* ** *** ******** ** **** ****. ** ********* *********** *** ********** * ******* ******** ***** for ********, *** ******** **** ***** ******** *** ********** **** of ***** ***************.

NOT ********* ** *************** *****

***** *** ***'* ***** **** *** *************** ** *** ******* a ***** ** *******, **** ******* *** *** ********** ********* the ************* *** *********** **** * ***************, ****** *** **** ************ *** *** ****** ** ***** remote ****** **** ** ***** ********.

Admin-Level ****** ********

*** *************** ******** ******* ** *** *** ********* **** *** administration *****, *** ** * ******** ********** *** **** ********** to ***** **** ** *****-***** *****. ***** ***** *** ********* the ******* *** *************** ******, ******* ************ ********** ******* ***** this.

************* *** ***'* ** ******* *** *********** ** **** ******* access ** *** ****** ***** *** ******* ***** ** *, and ***** *** ************** ***** *** **** **** ** ** 8. ***** ***** *********** **** ** ******* ******* ***********, *** vulnerabilities ****** **** **** ****** ** ** ********* ** ****-***** scenarios.

Default ** ********

*** *******, ********* *** ************ ** **** *****, ** **** Vivotek ******** ** ** ********, ******** *** **** ** ****** the ****** ****** * ******** ** ***********. **** ** * security **** ** ******.

*******'* ******** ********* ************** *** **** ******** ** *** ***** **** ***** ********* firmware, ************ ***** *** * ****** ********, *** ******* ** the ***** ** ***** **** ** ** *********. ***** *** follow *******'* ***** *** ******* **** ********* ***** ************* ****** the ******* ** ***** *************** ***** *********. *******, ******* ***** improve *** ******** ** ******* ****** ********* ** *******.

Vivotek ******* ** ******* ********

******* ****** **** **** **** ***** ** **** ************* **** first *********, *** **** **** ******* ** ******** ******* ** resolve **. ********** ****** ** ************, ********** ** **** ******** ******* ********* ** **** **, 2017.

OEM/ODM ****** *** ********

******* **** ******** ***/*** ******** *** **** ********* ** *** industry. ********* ** *******, ** **** ***** ***** ******** *** firmware ********* ** *** ******* ***'*** *** *******, *** **** those ******** ***** *** **** *******'* *******, *** ********** ***************.

Few ******** ********** *******

* ****** ***** ******** ********** *** ********-********** ******* *******, *** many ** ***** ******** ** ************** *****, ********** **** *** specified ** ***** **** ***** ** **** ********.

Risk ********-***

*******, ***** *************** **** * ********** *** ****, ************ ******* their ****** ***** *** ** ************* ******* **** ** ******* a ****** ***** ********, ********* ********* ***** *** ******* **, if **** **** *** *******. *******, ******* **** ** ***** the ********* *** ********* ** *** ****** ** ******** ***** on *** ******, ** ******** **** *** ****** **** * botnet ******, ****** ** ******* ******* ****** ****** **** *** not ******* **** ********* *****, ** ***** **** *********.

UPDATE **** **

******* *** ******* ******* ******** *** *** ******** ******. ******** can ** ***** *********'* ******* ****, *** ******** **** **** * "****.**" ****.

Comments (1)

******: ******* *** ******* ******* ******** *** *** ******** ******. Firmware *** ** ***** *********'* ******* ****, *** ******** **** **** * "****.**" ****.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Hacking

Last Chance - Save $50 - July 2018 IP Networking Course on Jun 21, 2018
Today, Thursday the 21st is the last chance to save $50 on registration. Register now and save. This is the only networking course designed...
Hikvision Corrects False Cybersecurity Announcement on Jun 18, 2018
Hikvision has corrected a false cybersecurity announcement that claimed a British government-sponsored program endorsed the cybersecurity of...
The Dumb Ones: PSA's Bozeman On Cybersecurity on Jun 15, 2018
The smart ones are the hundred people who flew to Denver and spent $500+ on a 1.5-day conference featuring Dahua as a 'cyber responsible partner',...
Debating Relevance of China Hacking US Navy Plans on Jun 11, 2018
"Chinese government hackers have compromised the computers of a Navy contractor, stealing massive amounts of highly sensitive data related to...
Remove Dahua and Hikvision Gov Installs Required By US House Bill Ban on Jun 06, 2018
The final released US House Bill HR 5515 verifies that it not only prohibits the purchasing of Dahua and Hikvision products, it requires removing...
Dahua's Terrible Cybersecurity, Buys Credibility From PSA And SIA on Jun 04, 2018
Dahua has a terrible cybersecurity track record. But American organizations, like the Security Industry Association (SIA) and the PSA Security...
Canon Responds To IP Camera Hacks on May 30, 2018
Canon cameras made international news earlier this month, with reports of them being hacked in Japan (e.g., Hackers disable scores of Canon-made...
Corruption Alleged Against Hikvision Procurement In India on May 28, 2018
Over the past month, allegations of corruption and national security risk have made the news in India over the planned purchase of 150,000...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Hikvision Source Code Transparency Center Examined on May 14, 2018
Following criticism of Hikvision's Chinese government ownership and Hikvision's IP camera backdoor, the company has responded with a series of...

Most Recent Industry Reports

Installation Hardware for Video Surveillance - Indoor Fasteners on Jun 22, 2018
As part of our Installation for Video Surveillance series, in this note, we cover drywall anchors. A key part of installing security hardware is...
Hikvision ColorVu Integrated Visible Light Cameras Examined on Jun 22, 2018
When it comes to low light, infrared light has become the defacto standard in surveillance. But IR is limited to monochrome images, making colors...
Last Chance - Save $50 - July 2018 IP Networking Course on Jun 21, 2018
Today, Thursday the 21st is the last chance to save $50 on registration. Register now and save. This is the only networking course designed...
'Secure Channel' OSDP Access Control Examined on Jun 21, 2018
Despite claiming to be better than Wiegand, OSDP's initial releases did not address the lack of encryption between reader and controller, leaving...
Most Wanted Improvements In Manufacturer Technical Support (Statistics) on Jun 21, 2018
5 key areas of improvement and 1 clear wanted support feature were voiced by 140+ integrator responses to: What improvement in manufacturer...
GDPR / ICO Complaint Filed Against IFSEC Show Facial Recognition on Jun 20, 2018
IPVM has filed a complaint against IFSEC’s parent company UBM based on our concern that the conference violates core GDPR principles on...
IFSEC 2018 Final Show Report on Jun 20, 2018
IPVM attended the IFSEC show for the first time this year. The Chinese have taken over the UK, centered on Hikvision, flanked by Dahua, Huawei and...
Mobotix Releases 'Move' Into 21st Century on Jun 20, 2018
For years, Mobotix stood resolutely against, well, every other manufacturer, selling it as a virtue: MOBOTIX equipment is designed with no...
Cybersecurity Startup VDOO Disclosing 10 Manufacturer Vulnerabilities Starting With Axis And Foscam on Jun 20, 2018
Cybersecurity startup VDOO has uncovered significant vulnerabilities in Axis cameras along with many others not yet disclosed. In this report, we...
Axis Guardian - Cloud VMS And Alarm Monitoring - Released on Jun 19, 2018
Axis has struggled to deliver a cloud-based managed service video platform. Video service providers have utilized AVHS for over a decade, and have...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact