Exploit the possiblities

HikVision Wi-Fi IP Camera Wireless Access Point State

HikVision Wi-Fi IP Camera Wireless Access Point State
Posted Nov 28, 2017
Authored by IOT Sec

HikVision Wi-Fi IP cameras come with a default SSID "davinci", with a setting of no WiFi encryption or authentication. Depending on the firmware version, there is no configuration option within the camera to turn off Wi-Fi. If a camera is deployed via wired ethernet, then the WiFi settings won't be adjusted, and a rogue AP with the SSID "davinci" can be associated to the camera to provide a new attack vector via WiFi to a wired network camera. Tested on firmware versions 5.3.0, 5.4.0, and 5.4.5 and model number DS-2CD2432F-IW.

tags | exploit
advisories | CVE-2017-14953
MD5 | 87464d23582bc4da4d3894ca7fc74bea

HikVision Wi-Fi IP Camera Wireless Access Point State

Change Mirror Download
Hikvision Wi-Fi IP Cameras associate to a default unencrypted rogue SSIDs in a wired configuration
Full disclosure
Nov 27, 2017

Synopsis:
---
HikVision Wi-Fi IP cameras come with a default SSID "davinci", with a setting of no WiFi encryption or authentication. Depending on the firmware version, there is no configuration option within the camera to turn off Wi-Fi. If a camera is deployed via wired ethernet, then the WiFi settings wonat be adjusted, and a rogue AP with the SSID "davinci" can be associated to the camera to provide a new attack vector via WiFi to a wired network camera.

Risk:
---
The security exposure provides an unexpected attack surface via Wi-Fi in a camera deployed in a wired environment. Devices running a firmware prior to v5.4.5 can be attacked via an access control bypass. http://seclists.org/fulldisclosure/2017/Sep/23
The camera will also do a DHCP on its wireless interface, so the rogue AP subnet would get preference versus a L3 adjacent NVR/viewer, performing a denial of service.

Mitigation:
---
The mitigation since the Wi-Fi cannot be turned off, is to specify a complex WPA2-PSK AES key. With this the camera will try to associate to a wireless PSK that doesnat exist, and it is unlikely that the attacker will be able to guess the complex key.
Via the web interface:
Configuration -> Network -> Advanced Settings -> Wi-Fi
Set Security Mode to: aWPA2-personala
Set Encryption Type to: aAESa
Set Key 1 to: A random long string of characters
Enable WPS: Uncheck

Vulnerability details:
---
Tested Model Number (Confirmed): DS-2CD2432F-IW
Tested Firmware Versions (Confirmed): 5.3.0, 5.4.0, 5.4.5
Exploit: Camera is hardwired via ethernet. Wi-Fi is unconfigured (by default).
Set up a rogue Wi-Fi access point with an SSID of "davinci" with no encryption.
The camera will associate with the rogue access point. There is no configuration option for the administrator to turn off WiFi. If the rogue access point offers DHCP the camera will get a dynamic address and be remotely accessible within Wi-Fi range. Combined with previous firmware exploits an attacker could remotely exploit or disable the camera simply by being within Wi-Fi range. The attack also circumvents any wired network security that may have been deployed on that segment, such as Firewalls, ACLs, turning off UPnP.

Timeline:
---
June 1, 2017 - Reported to security.usa@hikvision.com - No Response
June 6, 2017 - Reported again to security.usa@hikvision.com - No Response
September 29, 2017 - Reported again to security.usa@hikvision.com - No Response
September 29, 2017 - Reported to techsupport.usa@hikvision.com - Automated Response only - No follow up
September 29, 2017 - Reported to CERT. Tracking as VU#768573.
September 29, 2017 - Reported to MITRE. Assigned CVE-2017-14953.
October 3, 2017 - Reported to ICS-CERT upon CERT's recommendation - No response.
October 3, 2017 - Hikvision responds.
November 27, 2017 - Mutually agreed disclosure date. Exposure details released in the full disclosure distribution list.

Possibly affected camera model numbers (Wi-Fi) [unconfirmed]:
DS-2CD2112F-IWS
DS-2CD2132F-IWS
DS-2CD2522FWD-IWS
DS-2CD2542FWD-IWS
DS-2CD2412F-IW
DS-2CD2422FWD-IW
DS-2CD2432F-IW
DS-2CD2023G0D-IW2
DS-2CD2123G0D-IW2
DS-2DE2204IW-DE3/W

Rebranded products possibly affected [unconfirmed]:
ANNKE I61DR IP Camera 2MP 1080P HD Two-way audio
Amazon Name: ANNKE Wireless Cube Camera 1080P 2.0 Megapixel WiFi Network IP Camera


Comments

RSS Feed Subscribe to this comment feed

No comments yet, be the first!

Login or Register to post a comment

File Archive:

December 2017

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Dec 1st
    15 Files
  • 2
    Dec 2nd
    2 Files
  • 3
    Dec 3rd
    1 Files
  • 4
    Dec 4th
    15 Files
  • 5
    Dec 5th
    15 Files
  • 6
    Dec 6th
    18 Files
  • 7
    Dec 7th
    17 Files
  • 8
    Dec 8th
    15 Files
  • 9
    Dec 9th
    13 Files
  • 10
    Dec 10th
    4 Files
  • 11
    Dec 11th
    41 Files
  • 12
    Dec 12th
    44 Files
  • 13
    Dec 13th
    25 Files
  • 14
    Dec 14th
    15 Files
  • 15
    Dec 15th
    28 Files
  • 16
    Dec 16th
    3 Files
  • 17
    Dec 17th
    13 Files
  • 18
    Dec 18th
    0 Files
  • 19
    Dec 19th
    0 Files
  • 20
    Dec 20th
    0 Files
  • 21
    Dec 21st
    0 Files
  • 22
    Dec 22nd
    0 Files
  • 23
    Dec 23rd
    0 Files
  • 24
    Dec 24th
    0 Files
  • 25
    Dec 25th
    0 Files
  • 26
    Dec 26th
    0 Files
  • 27
    Dec 27th
    0 Files
  • 28
    Dec 28th
    0 Files
  • 29
    Dec 29th
    0 Files
  • 30
    Dec 30th
    0 Files
  • 31
    Dec 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2016 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close