Xiongmai New Critical Vulnerability - Same Manufacturer Whose Products Drove Mirai Botnet Attacks

Author: John Honovich, Published on Dec 12, 2017

The Chinese manufacturer whose products were primarily responsible for the 2016 Mirai botnet attack has a new critical vulnerability, confirmed by US DHS ICS-CERT, registering in at a 9.8 out of 10 on the CVSS scale, just under Hikvision's perfect 10 for their IP camera backdoor.

IPVM spoke with Clinton Mielke, the researcher who discovered the vulnerability, about his discovery, how it can be exploited, and the potential for it to become the basis of a new Mirai-style botnet.

*** ******* ************ ***** ******** **** ********* *********** *** ******* ***** ****** ********* * *** ******** *************, ********* ** ** *** ***-****, registering ** ** * *.* *** ** ** ** *** CVSS *****, **** **************'* ******* ** *** ***** ** ****** ********.

**** ***** *********** ******, *** ********** *** ********** *** *************, ***** *** *********, how ** *** ** *********, *** *** ********* *** ** to ****** *** ***** ** * *** *****-***** ******.

[***************]

Vulnerability *******

* ***** ******** ****** ********************* ******* ******** ******* *** *********, ******** *** ********* *** ********* ** ******* ***** *******, or *********** **** **** **** ******* *** * *** ******.

*** ************* *** ** ********* ** ******* ****, *** **** direct ******** ********* ** ****** *** ****** (******* * ****** of ******* *** **** ******) **** * ****** *** *******. While * ******** **** ** ******** ******* *** ******** ******** has *** *** **** ********, *** ********** ****** ** ********* affects ***** ******, **** **** ****** ********. *** ************* ** linked ** ********** **** ******* ********'* "*************** ***" *********.

***-**** ***** **** * *.*/**, ********* *** *** **** ** exploit *** ******* ** ** ********* ********.

No ***** ** ******* ********

****** **** ** **** *** **** ** ******* ***** ** concept **** ******* ******** **** ** ******** *** ************* ** discovered. ** *** ***** **** *** ****** ******** ******** ******* an *********** **** ****** ** **** ** *** ******** *** the *** *****, ***** *** ** **** **** * ****** curl ** **** *******, ****** ** ****** **** ** ********.

Botnet *********

*** ********** ******** **** ************* *** *** ********* ** ** built **** ** ****** **** *********/****** *************, ***** ***** ** the ***** *** ******** * *** ******. **** ***** ******* additional ******, ******* ******** ********, **** ** *****, **** ***** that ********** ***** ****** ******* *** ** ********* *** *****-*** types, ****** ** ****** ****** **** ********* **** ******* **** vulnerability *******, *** **** ****** ****** ** ** ** *** possible.

No ******** **

******** *** *** ********** ** ******** **** *** ********** *** IPVM ** ******* ** **** *********. ****, ** **** ** available **** ******** ** **** **** ** ******* ** ******** models *** ******* ******** ************.

Brands ********

******* ******** ********* ***** ** ****, **** ************* ******* * wide ******* ** ******. * ****** ** ****** ****** ******** brands/web ********** *** ***** *** *************** ******. ***** **** **** relatively ***** ******, **** ****** *****, **** ***********, * ***** ***** ******** ***, **** *****.


Shared ******* - ****** ***** ************* ********

*** ************* ** ****** ** * ******* **** *** ********** says ** **** ** ************* ******* ********, ******** ******* ** other ************* ***** ******** ** ****. **** *** ***** **** incentive ** ********* ** ******* **** ************* ** ********* ** it *** ** **** *** ****** ** ****** ** ******* purposes. ********* ** *** **********, ***** ******** *** *** ****** to ***** **** *******/*************, ***** ** ***** ** ******* ***** units.

Comments (6)

***-**** ***** **** * *.*/**, ********* *** *** **** ** exploit *** ******* ** ** ********* ********.

****, *** **** *** ******* ** *******, *.* ***** * bit **** *** ********* ****, ** *** ** *****, *** only ****** *** ******.

******** **** **** *** ***** ** *******, ** **** ****** to ****** **** *** ********** *** ******* ***** ** **** degree ** ****** *** ************* ******* *******.

***** *** **** **** *************** **** ***** **** * ******** but *** ** ***** *****, ** ** ***** *********.

*** ****** ***** ********* ** ***-****. ***** ****** *** *** to **.

*** **** ****:

********** ************ ** **** *********************** *** ****** ** ****** *** ****** ** * **** vulnerable ***** ** ***** ****** ** **********.

***

*** *****-***** ****** ******** ************* *** **** **********, ***** *** allow ** ******** ** ******* **** ******** ** ***** *** device. ***** *********, *** ****** ******** ****** ** * **** vulnerable ***** ** ***** ****** ** **********.

**** **** **** **** ****** ****************** ***** **** ****** *******?

*** ******* ****'* ** **** ** *** ********** **** ******* the ******, ** ** *** ********* ** **. ** *** camera *** ****** ******* ** *******, **** ****** **** ** open **** ** *******.

...**** ******* *** ******...

** **** ****, ****, *** ******* ***** ** ** ***, in ********** *** *************** *** ********* *******:

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports on Power

Axis Supports HD Analog on Apr 15, 2019
In 2017, Axis declared 'Everything is IP': Now, in 2019, Axis has released support for HD analog, with their new encoders.  Why the change?...
Pole Mount Camera Installation Guide on Apr 11, 2019
Poles are a popular but challenging choice for deploying surveillance cameras outdoors. Poles are indispensable for putting cameras at the right...
Large Hospital Security End User Interview on Mar 21, 2019
This large single-state healthcare system consists of many hospitals, and hundreds of health parks, private practices, urgent care facilities, and...
Retired Mercury President Returns As Open Options President on Mar 18, 2019
Open Options experienced major changes in 2018, including being acquired by ACRE and losing its President and General Manager, John Berman who...
Private School IT Manager Surveillance Interview on Feb 22, 2019
This IT manager describes himself as the "oft-maligned IT person" whose "opinions may not always be appreciated by the integrator crowd." But he is...
Outdoor Camera Mounting Hardware Guide on Feb 21, 2019
Mounting cameras outdoors can be challenging, requiring understanding different types of equipment and methods. In this guide, we teach this...
BluB0x Company Profile on Feb 20, 2019
BluB0x has doubled in revenue every year since its founding in 2013, according to CEO Patrick Barry. We originally reported on them in 2015. At the...
Security Installation Tools Guide - 22 Tools Listed on Feb 19, 2019
In this guide, we cover 22 tools that security installers frequently use. This is one part of our upcoming Video Surveillance...
Cisco Meraki Cloud VMS/Cameras Tested on Feb 13, 2019
Cisco Meraki says their cameras "bring Meraki magic to the enterprise video security world". According to Meraki, their magic is their management...
Dahua Intercom Tested on Feb 07, 2019
Video intercoms are a growing market with video surveillance manufacturers expanding into this niche. IPVM is continuing its series of video...

Most Recent Industry Reports

H.265 Usage Statistics on Apr 19, 2019
H.265 has been available in IP cameras for more than 5 years and, in the past few years, the number of manufacturers supporting this codec has...
ACRE Acquires RS2, Explains Acquisition Strategy on Apr 19, 2019
ACRE continues to buy, now acquiring RS2, just 5 months after buying Open Options. One is a small access control manufacturer from Texas, the...
Access Control Course Spring 2019 - Last Chance on Apr 19, 2019
Register for the Spring Access Control Course. IPVM offers the most comprehensive access control course in the industry. Unlike manufacturer...
Riser vs Plenum Cabling Explained on Apr 18, 2019
You could be spending twice as much for cable as you need. The difference between 'plenum' rated cable and 'riser' rated cable is subtle, but the...
Verint Victimized By Ransomware on Apr 18, 2019
Verint, which is best known in the physical security industry for video surveillance but has built a sizeable cybersecurity business as well, was...
Milestone Drops IFSEC on Apr 18, 2019
Milestone has dropped out of Europe's largest annual security trade show (IFSEC 2019), telling IPVM that they "have found that IFSEC in EMEA no...
The Fastest Growing Video Surveillance Sales Organization Ever - Verkada on Apr 17, 2019
Verkada has the fastest growing video surveillance sales organization ever. In less than 2 years, they already have more salespeople in the US...
Door Operators Access Control Tutorial on Apr 17, 2019
Doors equipped with door operators, specialty devices that automate opening and closing, tend to be quite complex. The mechanisms needed to...
Securadyne CEO: IPVM 'Entertaining For An Ignorant Few' on Apr 16, 2019
Securadyne's CEO Carey Boethel is unhappy with IPVM's report - Failed Integrator Rollup, Securadyne Sells to Guard Giant Allied. Indeed, he...
Dahua Repositionable IR Multi-Imager Camera Tested on Apr 16, 2019
Dahua has released their first repositionable multi-imager camera, the Multi-Flex 4x2MP, claiming integrated IR, true WDR, and flexible...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact