Device hijacking may be possible due to a security vulnerability in Dahua IP cameras. - TechnoExploit

Breaking

Post Top Ad

Post Top Ad

Sunday, August 14, 2022

Device hijacking may be possible due to a security vulnerability in Dahua IP cameras.

 



Researchers found a significant flaw in Dahua IP cameras that could be used by an attacker to take control of the target. Following the vulnerability report, the vendors patched the issue and advised users to update their devices as quickly as possible.

Dahua IP Cameras Security Vulnerability

In a recent advisory, Nozomi Networks Labs stated that its researchers had discovered a significant security flaw in several Dahua IP cameras.

Chinese tech firm Dahua sells items for video surveillance. It is a well-known company with representation in many nations, including the USA. Network recorders, network cameras, intercoms, fire alarms, IVS, drones, and other security products are among the many security products that the company manufactures.

Typically, the problem in question affected IP cameras that used the Open Network Video Interface Forum (ONVIF). When examining the IPC-HDBW2231E-S-S2 camera to determine the specifics of the device fingerprinting, the researchers discovered the vulnerability. They found how to fake a Create Users request to add an unauthorized admin account during this testing. The acceptance of the request by the device revealed the vulnerability in the WS-Username Token authentication process.

Testing the newly generated account demonstrated that a malicious attacker could totally control the target device by following the same steps. "Sniffing one unprotected ONVIF request authenticated with the WS-Username Token schema" would be all that was necessary. Because this token is present by default and most Dahua devices disclose unencrypted HTTP data, exploiting the flaw would've been simple.

Dahua Patched The Bug

The researchers notified Dahua of a vulnerability when they found it, and Dahua finally fixed the problem. This vulnerability, CVE-2022-30563, had a CVSS base score of 6.8, according to Dahua's advisory. According to the advisory's description,

An attacker can log into the device by recreating the user's login packet when he successfully logs in through ONVIF using a man-in-the-middle attack to sniff the request packets.


The suppliers also patched three additional, comparatively less serious vulnerabilities in the devices.

The following device models are listed as being affected in the US CISA's advisory for these vulnerabilities.
  • Dahua IPC-HDBW2XXX: Versions prior to v2.820.0000000.48.R.220614 
  • Dahua IPC-HX2XXX: Versions Prior to v2.820.0000000.48.R.220614
  • Dahua ASI7XXX: Versions prior to v1.000.0000009.0.R.220620
CISA advises users to upgrade their devices as soon as possible after the release of the patched versions in order to stay safe.

Read More : Apple was once working on affordable ‘ iPhone Nano’, according to Steve Jobs email

10 comments:

Post Top Ad