Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Bug Privacy Security IT

58,000 Security Camera Systems Critically Vulnerable To Attackers 157

Sparrowvsrevolution writes with news of some particularly insecure security cameras. From the article: "Eighteen brands of security camera digital video recorders are vulnerable to an attack that would allow a hacker to remotely gain control of the devices to watch, copy, delete or alter video streams at will, as well as to use the machines as jumping-off points to access other computers behind a company's firewall, according to tests by two security researchers. And 58,000 of the hackable video boxes, all of which use firmware provided by the Guangdong, China-based firm Ray Sharp, are accessible via the Internet. Early last week a hacker who uses the handle someLuser found that commands sent to a Swann DVR via port 9000 were accepted without any authentication. That trick would allow anyone to retrieve the login credentials for the DVR's web-based control panel. To compound the problem, the DVRs automatically make themselves visible to external connections using a protocol known as Universal Plug And Play, (UPnP) which maps the devices' location to any local router that has UPnP enabled — a common default setting. ...Neither Ray Sharp nor any of the eighteen firms have yet released a firmware fix."
This discussion has been archived. No new comments can be posted.

58,000 Security Camera Systems Critically Vulnerable To Attackers

Comments Filter:
  • Re:well ... (Score:5, Informative)

    by green1 ( 322787 ) on Monday January 28, 2013 @11:27PM (#42722655)

    Of course the point was that with most standard firewalls in their default setting, this automatically punches it's own holes through the firewall, it's a feature....

    So it's more like "it's not like you shoud have this unprotected by a firewall that you have carefully setup yourself without any autoconfiguration options"

  • Re:well ... (Score:5, Informative)

    by fluffy99 ( 870997 ) on Monday January 28, 2013 @11:30PM (#42722671)

    That these system will punch holes in a upnp capable router is part of the problem. Many people may not realize their DVR is even accessible from outside. Step number one on any home routers I setup is to disable upnp because malicious software also likes to punch holes.

  • Port knocking (Score:5, Informative)

    by Okian Warrior ( 537106 ) on Monday January 28, 2013 @11:33PM (#42722695) Homepage Journal

    Port knocking is where the inbound system won't connect until a series of unsuccessful attempts is tried on a known sequence of ports - the system will open the door only when the visitor gives the "secret knock".

    For example, a system won't normally accept connection requests. If the visitor attempts (unsuccessfully) ports 1010, 1050, 3042, and 4725 in that order, the system then accepts a connection at port 9000. (Use different numbers and length as needed for security.)

    It is nigh impossible for a security audit to detect this type of camouflage. This technique has been well-known for years.

    If China were putting back-doors in hardware systems, they could make them virtually impossible to find.

    That's circumstantial evidence that this isn't a case of espionage on the part of the manufacturer. It's more likely a flaw in the software or a debugging port that wasn't compiled out in the released version.

  • Re:well ... (Score:5, Informative)

    by shitzu ( 931108 ) on Tuesday January 29, 2013 @01:46AM (#42723135)

    The difference is simple (but huge). To allow a program or device to make an outgoing NAT connection, i have to assume that it is not malicious. To allow programs and devices map incoming ports via upnp i have to assume that it is not malicious AND it is not buggy enough to allow gazillion script kiddies access to my network. So thanks, but no thanks on the upnp front - i keep my open tcp ports to a minimum.

  • Q-See vulnerable too (Score:3, Informative)

    by kamaaina ( 1071006 ) on Tuesday January 29, 2013 @02:31AM (#42723293)

    I have the QC444 and you can telnet to it as root with no password.

    Also when you access the camera, your creds go out via cleartext and you can easily see what your password is.

    ActiveX is used to log in and manage the box remotely, also if you use a password longer than 6 characters, you cannot use the PSS software that they put otu on their web site.

    There was also some weirdness with it trying to talk to IP address 70.151.24.203

Happiness is twin floppies.

Working...