Not for public release in order to protect companies/end users. The is the most serious form of vulnerability for this device type. Potentially enable physical attack on site: Yes.Latest firmware vulnerable: Yes (as of 21 June 2021).Zero click (no action needed from device owner): Yes.
Vivitar ipc 113 v1 full#
I wrote a full report to them identifying the problem code, the device types affected, POC and recommendations for resolution.Īt the time of writing, patched firmware is partially available though inconsistently deployed across various Hikvision firmware portals. This vulnerability was reported to Hikvision the day after discovery, on 21 June 2021. It will not be detectable by any logging on the camera itself. No username or password needed nor any actions need to be initiated by camera owner. Only access to the http(s) server port (typically 80/443) is needed. Given the deployment of these cameras at sensitive sites potentially even critical infrastructure is at risk.Ī list of affected firmware types can be found at the end of this document.įirmware from as long ago as 2016 has been tested and found to be vulnerable.
Vivitar ipc 113 v1 code#
This is the highest level of critical vulnerability – a zero click unauthenticated remote code execution (RCE) vulnerability affecting a high number of Hikvision cameras. In addition to complete compromise of the IP camera, internal networks can then be accessed and attacked. This permits an attacker to gain full control of device with an unrestricted root shell, which is far more access than even the owner of the device has as they are restricted to a limited “protected shell” (psh) which filters input to a predefined set of limited, mostly informational commands. Hikvision’s security advisory: security-notification-command-injection-vulnerability-in-some-hikvision-products Some NVRs are also affected, though this is less widespread. Some older models are affected also as far back as at least 2016. The majority of the recent camera product ranges of Hikvision cameras are susceptible to a critical remote unauthenticated code execution vulnerability even with latest firmware (as of 21 June 2021). Is this a Chinese Government mandated backdoor?
![vivitar ipc 113 v1 vivitar ipc 113 v1](https://cdn11.bigcommerce.com/s-b0ocjdsnnv/images/stencil/500x659/products/7901/21242/api1ywkfw__60977.1600787192.jpg)
Vulnerability discovered 20 June 2021 Table of Contents:Ī few stills from the real attack POC video
![vivitar ipc 113 v1 vivitar ipc 113 v1](https://m.media-amazon.com/images/I/41w2oKiZfCL._AC_SX466_.jpg)
This article has been written for a technical audience.