Details about an access control bypass in Hikvision IP cameras were posted on Full Disclosure, now some owners are seeing HACKED on camera displays instead of live feed imagery. Credit: wolfblitzer69 HACKED — That is what is shown on all camera displays instead of live feed video for some Hikvision security camera owners. If it happened to you, then say hello to the backdoor in your security camera.It’s not just happening to Hikvision-branded IP cameras either, as the backdoor is in “many white-labeled camera products sold under a variety of brand names.”Apparently, enough time has passed for attackers to get into the game. On Sept. 12, security researcher “Monte Crypto” posted the access control bypass in Hikvision IP cameras on the Full Disclosure mailing list.“Many Hikvision IP cameras contain a backdoor that allows unauthenticated impersonation of any configured user account,” Monte Crypto warned. “The vulnerability poses a severe risk [and] is trivial to exploit.” A photo example of “HACKED” replacing the cameras’ live video feed was posted by Reddit user wolfblitzer69. Yet a little searching proves he is far from the only one.The first thing a person trying to help would likely suggest is to change the default or weak password, but that won’t fix the problem this time. Monte Crypto explained, “In addition to gaining full administrative access, the vulnerability can be used to retrieve plain-text passwords for all configured users.” Back in May, the Department of Homeland Security’s ICS-CERT issued an advisory about remotely exploitable vulnerabilities in Hikvision cameras; these were not flaws that required an uber hacker, as it took a “low skill level to exploit.”Five months ago, ICS-CERT warned, “Successful exploitation of these vulnerabilities could lead to a malicious attacker escalating his or her privileges or assuming the identity of an authenticated user and obtaining sensitive data.”Nevertheless, when Monte Crypto released the full disclosure he/she said, “Hundreds of thousands of vulnerable devices are still exposed to the internet at the time of publishing.”Hacked cam? Consider unplugging that puppy from the internet. Monte Crypto recommended that you:Immediately upgrade or disconnect all Hikvision products from the internet or untrusted networks, or at least implement network access control rules that only allow trusted IP addresses to initiate connections to vulnerable devices. Keep in mind that many Hikvision IP cameras come with UPNP enabled by default and can expose themselves to the internet automatically. Hikvision released firmware updates for many camera models where backdoor code is removed. If an update is available for your device, you should install it as soon as possible.Firmware may brick some cameras: Brick fixRegarding the firmware update, Monte Crypto warned:Be aware that many Hikvision cameras sold online as “Multilanguage” or “English, not upgradeable” are in fact modified Chinese-language (domestic market) cameras. Attempting to upload English firmware into such cameras could result in a boot loop that can only be recovered from by flashing original Chinese-language firmware over TFTP. If you do not understand what this paragraph says or [are] not entirely sure that your camera is an export English-language model, do not attempt to upgrade it.While the full disclosure is new, the vulnerabilities in Hikvision cameras are not. Monte Crypto notified Hikvision in March. Six days later, Hikvision published a vulnerability notice and starting putting out new firmware updates. Put another way: After some individuals tried to update the firmware and found out they could not, IP Cam Talk user alastairstevenson explained that Hikvision “implemented a ‘downgrade block’ to stop users fixing their cameras by installing older, working firmware. You can, however, fix this, after quite a lot of reading, by using the ‘brick-fix tool’ from here: Hikvision DS-2CD2x32-I (R0) brick-fix tool / full upgrade method / fixup roundup.”Hikvision vulnerability detailsThe full disclosure vulnerability notice includes details about a superuser admin account in all Hikvision products, an example of how to retrieve users and roles, how to obtain a camera snapshot without authentication, as well as how to download the camera configuration.IPVM published this Hikvision backdoor exploit demo video: Monte Crypto pointed out that “the vulnerability has been present in Hikvision products since at least 2014.” It is up to you to decide if it was a “planted backdoor or accidental bug.” Read more:REPORT: Surveillance cameras most dangerous IoT devices in enterpriseREVIEW: Home security cameras fall short on securityIoT malware targets 100,000 IP cameras via known flawInsecure security cameras sound like a joke, but aren’t Related content news Dow Jones watchlist of high-risk businesses, people found on unsecured database A Dow Jones watchlist of 2.4 million at-risk businesses, politicians, and individuals was left unprotected on public cloud server. By Ms. Smith Feb 28, 2019 4 mins Data Breach Hacking Security news Ransomware attacks hit Florida ISP, Australian cardiology group Ransomware attacks might be on the decline, but that doesn't mean we don't have new victims. A Florida ISP and an Australian cardiology group were hit recently. By Ms. Smith Feb 27, 2019 4 mins Ransomware Security news Bare-metal cloud servers vulnerable to Cloudborne flaw Researchers warn that firmware backdoors planted on bare-metal cloud servers could later be exploited to brick a different customer’s server, to steal their data, or for ransomware attacks. By Ms. Smith Feb 26, 2019 3 mins Cloud Computing Security news Meet the man-in-the-room attack: Hackers can invisibly eavesdrop on Bigscreen VR users Flaws in Bigscreen could allow 'invisible Peeping Tom' hackers to eavesdrop on Bigscreen VR users, to discreetly deliver malware payloads, to completely control victims' computers and even to start a worm infection spreading through VR By Ms. Smith Feb 21, 2019 4 mins Hacking Vulnerabilities Security Podcasts Videos Resources Events SUBSCRIBE TO OUR NEWSLETTER From our editors straight to your inbox Get started by entering your email address below. Please enter a valid email address Subscribe