Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!


Forgot your password?
Bug Privacy Security IT

58,000 Security Camera Systems Critically Vulnerable To Attackers 157

Sparrowvsrevolution writes with news of some particularly insecure security cameras. From the article: "Eighteen brands of security camera digital video recorders are vulnerable to an attack that would allow a hacker to remotely gain control of the devices to watch, copy, delete or alter video streams at will, as well as to use the machines as jumping-off points to access other computers behind a company's firewall, according to tests by two security researchers. And 58,000 of the hackable video boxes, all of which use firmware provided by the Guangdong, China-based firm Ray Sharp, are accessible via the Internet. Early last week a hacker who uses the handle someLuser found that commands sent to a Swann DVR via port 9000 were accepted without any authentication. That trick would allow anyone to retrieve the login credentials for the DVR's web-based control panel. To compound the problem, the DVRs automatically make themselves visible to external connections using a protocol known as Universal Plug And Play, (UPnP) which maps the devices' location to any local router that has UPnP enabled — a common default setting. ...Neither Ray Sharp nor any of the eighteen firms have yet released a firmware fix."
This discussion has been archived. No new comments can be posted.

58,000 Security Camera Systems Critically Vulnerable To Attackers

Comments Filter:
  • by Taco Cowboy ( 5327 ) on Monday January 28, 2013 @11:33PM (#42722699) Journal

    The Chinese are out to get us

    If I were you, I'll be more worried about Uncle Sam

  • by fuzzyfuzzyfungus ( 1223518 ) on Tuesday January 29, 2013 @12:43AM (#42722923) Journal

    What, nobody has complained about this being an intentional backdoor yet? The Chinese are out to get us.

    I'm inclined to keep "Never attribute to malice something much stupider than malice would have implemented" in mind as a variant on the usual phrase.

    Given the hordes of profit-driven, variously political, and simply lulz-oriented attackers on the internet, relatively blatant backdooring(when you are in the privileged position of being the guys shipping the firmware, no less, hard to ask for more insider access than that) amounts to squandering an advantage. Had the units shipped with, say, a bugged sshd that is hardcoded to always allow access via keypair auth with a specific private key, it is both much more likely that nobody would ever have noticed, and that nobody but the intended attacker would ever have been able to make use of the vulnerability. A wholly unauthenticated hole, on the other hand, is an open invitation to every bot-herder and na'er-do-well on the planet to come and have a rummage through the systems, leading to much greater competition for the creator of the backdoor.

  • by Gordonjcp ( 186804 ) on Tuesday January 29, 2013 @04:56AM (#42723727) Homepage

    Who's going to buy the stuff if no one has any money left?

    The entire rest of the world. China isn't particularly dependent on one country with no money.

God made machine language; all the rest is the work of man.