Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks

Author: John Honovich, Published on Dec 12, 2017

The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by US DHS ICS-CERT, registering in at a 9.8 out of 10 on the CVSS scale, just under Hikvision's perfect 10 for their IP camera backdoor.

IPVM spoke with Clinton Mielke, the researcher who discovered the vulnerability, about his discovery, how it can be exploited, and the potential for it to become the basis of a new Mirai-style botnet.

*** ******* ************ ***** ******** **** ********* *********** *** ******* ***** ****** ********* * *** ******** *************, ********* ** ** *** ***-****, registering ** ** * *.* *** ** ** ** *** CVSS *****, **** **************'* ******* ** *** ***** ** ****** ********.

**** ***** *********** ******, *** ********** *** ********** *** *************, ***** *** *********, how ** *** ** *********, *** *** ********* *** ** to ****** *** ***** ** * *** *****-***** ******.

[***************]

Vulnerability *******

* ***** ******** ****** ********************* ******* ******** ******* *** *********, ******** *** ********* *** ********* ** ******* ***** *******, or *********** **** **** **** ******* *** * *** ******.

*** ************* *** ** ********* ** ******* ****, *** **** direct ******** ********* ** ****** *** ****** (******* * ****** of ******* *** **** ******) **** * ****** *** *******. While * ******** **** ** ******** ******* *** ******** ******** has *** *** **** ********, *** ********** ****** ** ********* affects ***** ******, **** **** ****** ********. *** ************* ** linked ** ********** **** ******* ********'* "*************** ***" *********.

***-**** ***** **** * *.*/**, ********* *** *** **** ** exploit *** ******* ** ** ********* ********.

No ***** ** ******* ********

****** **** ** **** *** **** ** ******* ***** ** concept **** ******* ******** **** ** ******** *** ************* ** discovered. ** *** ***** **** *** ****** ******** ******** ******* an *********** **** ****** ** **** ** *** ******** *** the *** *****, ***** *** ** **** **** * ****** curl ** **** *******, ****** ** ****** **** ** ********.

Botnet *********

*** ********** ******** **** ************* *** *** ********* ** ** built **** ** ****** **** *********/****** *************, ***** ***** ** the ***** *** ******** * *** ******. **** ***** ******* additional ******, ******* ******** ********, **** ** *****, **** ***** that ********** ***** ****** ******* *** ** ********* *** *****-*** types, ****** ** ****** ****** **** ********* **** ******* **** vulnerability *******, *** **** ****** ****** ** ** ** *** possible.

No ******** **

******** *** *** ********** ** ******** **** *** ********** *** IPVM ** ******* ** **** *********. ****, ** **** ** available **** ******** ** **** **** ** ******* ** ******** models *** ******* ******** ************.

Brands ********

******* ******** ********* ***** ** ****, **** ************* ******* * wide ******* ** ******. * ****** ** ****** ****** ******** brands/web ********** *** ***** *** *************** ******. ***** **** **** relatively ***** ******, **** ****** *****, **** ***********, * ***** ***** ******** ***, **** *****.


Shared ******* - ****** ***** ************* ********

*** ************* ** ****** ** * ******* **** *** ********** says ** **** ** ************* ******* ********, ******** ******* ** other ************* ***** ******** ** ****. **** *** ***** **** incentive ** ********* ** ******* **** ************* ** ********* ** it *** ** **** *** ****** ** ****** ** ******* purposes. ********* ** *** **********, ***** ******** *** *** ****** to ***** **** *******/*************, ***** ** ***** ** ******* ***** units.

Comments (6)

***-**** ***** **** * *.*/**, ********* *** *** **** ** exploit *** ******* ** ** ********* ********.

****, *** **** *** ******* ** *******, *.* ***** * bit **** *** ********* ****, ** *** ** *****, *** only ****** *** ******.

******** **** **** *** ***** ** *******, ** **** ****** to ****** **** *** ********** *** ******* ***** ** **** degree ** ****** *** ************* ******* *******.

***** *** **** **** *************** **** ***** **** * ******** but *** ** ***** *****, ** ** ***** *********.

*** ****** ***** ********* ** ***-****. ***** ****** *** *** to **.

*** **** ****:

********** ************ ** **** *********************** *** ****** ** ****** *** ****** ** * **** vulnerable ***** ** ***** ****** ** **********.

***

*** *****-***** ****** ******** ************* *** **** **********, ***** *** allow ** ******** ** ******* **** ******** ** ***** *** device. ***** *********, *** ****** ******** ****** ** * **** vulnerable ***** ** ***** ****** ** **********.

**** **** **** **** ****** ****************** ***** **** ****** *******?

*** ******* ****'* ** **** ** *** ********** **** ******* the ******, ** ** *** ********* ** **. ** *** camera *** ****** ******* ** *******, **** ****** **** ** open **** ** *******.

...**** ******* *** ******...

** **** ****, ****, *** ******* ***** ** ** ***, in ********** *** *************** *** ********* *******:

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Power

Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Axis 2N Intercom Tested on Nov 08, 2018
Axis expanded its video intercom business buying Czech-based 2N in 2016. Despite competing against owner Axis' intercoms, 2N recently registered as...
Ubiquiti Protect Video Surveillance Profile on Nov 07, 2018
Ubiquiti has now been in the video surveillance market for 7 years (see our first coverage back in 2011). In that time, the company's revenue has...
Directory Of Video Doorbells on Nov 06, 2018
Video doorbells are one of the fastest growing categories in video surveillance, especially among residences. The optimal placement of these...
Solar-Powered, Smart-Phone-Based Access Kit (VIZPin) Examined on Nov 02, 2018
Cloud-based access control company VIZPin is releasing a solar-powered and smart phone based access control system for gates and other remote...
Video Surveillance Hard Drive Failure Statistics 2018 on Nov 02, 2018
Hard drive failures can be significant service problems but how common of an issue are they in video surveillance? How long do drives last when...
IP Camera Installation Tool Shootout - Avigilon, Axis, Ideal, Hanwha, Triplett, Veracity on Oct 23, 2018
Setting up IP cameras has historically been challenging, with techs often precariously using a laptop on a ladder or lift. Some options for install...
Integrator Laptop Guide on Oct 16, 2018
This 18-page guide provides guidance and statistics about integrator laptop use. 150 integrators explained to IPVM in detail about their laptops,...
Higher Power PoE 802.3bt Ratified, Impact on Security Products Examined on Oct 12, 2018
Power over Ethernet has become one of the most popular features of many video, access, and other security products. See our PoE for IP Video...
Door Hinges Guide on Oct 10, 2018
Some of the trickiest access control problems are caused by bad door hinges. From doors not closing right, to locks not locking, worn or warped...

Most Recent Industry Reports

'Sticker' Surveillance Camera Developed (CSEM Witness) on Nov 16, 2018
The Swiss Center for Electronics and Microtechnology (CSEM) has announced what it calls the: world’s first fully autonomous camera that can be...
ISC East 2018 Mini-Show Final Report on Nov 16, 2018
This is our second (updated) and final show report from ISC East. ISC East, by its own admission, is not a national or international show, billed...
Facial Detection Tested on Nov 16, 2018
Facial detection and recognition are increasingly offered by video surveillance manufacturers. Facial detection detects faces in an image/video...
Throughtek P2P/Cloud Solution Profile on Nov 15, 2018
Many IoT manufacturers either do not have the capabilities or the interest to develop their own cloud management software for their devices....
ASIS Offering Custom Research For Manufacturers on Nov 15, 2018
Manufacturers often want to know what industry people think about trends and, in particular, the segments and product they offer.  ASIS and its...
Hikvision Silent on "Bad Architectural Practices" Cybersecurity Report on Nov 14, 2018
A 'significant vulnerability was found in Hikvision cameras' by VDOO, a startup cybersecurity specialist. Hikvision has fixed the specific...
French Government Threatens School with $1.7M Fine For “Excessive Video Surveillance” on Nov 14, 2018
The French government has notified a high-profile Paris coding academy that it risks a fine of up to 1.5 million euros (about $1.7m) if it...
Integrator Credit Card Alternative Divvy on Nov 13, 2018
Most security integrators are small businesses but large enough that they have various employees that need to be able to expense various charges as...
Directory of Video Intercoms on Nov 13, 2018
Video Intercoms, also known as Video Door-Phones or Video Entry Systems, have been growing in the past decade as more and more IP camera...
Beware Amazon Go Store Hype (Tested) on Nov 13, 2018
IPVM's trip to and testing of Amazon Go's San Francisco store shows a number of significant operational and economic issues that undermine the...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact