Vulnerabilities / Threats

02:00 PM
Connect Directly

Surveillance Cameras Next On The Insecure IoT List

Three buffer overflow vulnerabilities leave HikVision video recorders open to remote code execution.

Vulnerabilities in digital surveillance cameras could help burglars and other in-person criminals operate in secrecy, according to research released today by Rapid7 Labs. The three buffer overflow vulnerabilities discovered in HikVision digital video recorders (DVRs) leave the devices open to denials of service, remote code execution, and complete remote control -- which would allow attackers to delete surveillance footage altogether.

Further, say researchers, the HikVision devices could be used as nodes in a botnet, like other digital video recorders were used in a botnet that researchers discovered mining Bitcoins in April -- a pursuit that slow, low-powered DVRs are woefully unsuited for, security researchers said.

[Is IT the new boss of video surveillance? Read why at DarkReading, whether your physical security department likes it or not.]

An infected DVR could also be used as a proxy to access other devices in its local network -- including workstations, point-of-sale systems, or other insecure machines in the Internet of Things. HikVision models are popular across the IPv4 space, owing in part to the fact that users can view the streams remotely with an iPhone app.

All three buffer overflow vulnerabilities affect the code that handles real-time streaming protocol (RTSP) requests. None of them require authentication to exploit. Rapid7 has posted denial-of-service proof-of-concept exploits for the vulnerabilities in the RTSP request body handling (CVE-2014-4878) and header handling (CVE-2014-4879).

The Metasploit project has published a module that demonstrates how the third vulnerability -- CVE-2014-4880, in the RTSP Basic Authentication handling -- can be exploited to grant the attacker full remote control of the device.

Rapid7 estimates that approximately 150,000 devices contain these vulnerabilities. HikVision was called out for a similar vulnerability last year (CVE-2013-4977), which has not yet been patched.

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Ninja
11/21/2014 | 9:49:19 AM
Re: All devices?
Hey. The device that was tested was a Hikvision-DS-7204-HVI-SV digital video recorder device with firmware V2.2.10 build 131009 (Oct 2013). Other devices in the same model range are affected too.


Marilyn Cohodas
Marilyn Cohodas,
User Rank: Strategist
11/21/2014 | 7:26:30 AM
All devices?
Hi Sara, does this vuln apply to all Hikvision devices or just some?
White House Cybersecurity Strategy at a Crossroads
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/17/2018
Mueller Probe Yields Hacking Indictments for 12 Russian Military Officers
Kelly Jackson Higgins, Executive Editor at Dark Reading,  7/13/2018
10 Ways to Protect Protocols That Aren't DNS
Curtis Franklin Jr., Senior Editor at Dark Reading,  7/16/2018
Register for Dark Reading Newsletters
White Papers
Cartoon Contest
Write a Caption, Win a Starbucks Card! Click Here
Latest Comment: Siri??  You're a guy?
Current Issue
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2018-07-20
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive ...
PUBLISHED: 2018-07-20
Apache Ignite 2.5 and earlier serialization mechanism does not have a list of classes allowed for serialization/deserialization, which makes it possible to run arbitrary code when 3-rd party vulnerable classes are present in Ignite classpath. The vulnerability can be exploited if the one sends a spe...
PUBLISHED: 2018-07-20
An issue was discovered in idreamsoft iCMS before 7.0.10. XSS exists via the fourth and fifth input elements on the admincp.php?app=prop&do=add screen.
PUBLISHED: 2018-07-20
In Msvod Cms v10, SQL Injection exists via an images/lists?cid= URI.
PUBLISHED: 2018-07-20
MetInfo 6.0.0 allows XSS via a modified name of the navigation bar on the home page.