


Many video surveillance systems don't have any protection algorithm for attempting login. However, using a strong password is the vital step to protect your video surveillance equipment from hacking.

Typically they use simple password which is easy to remember. A strong password must be one which contains a combination of three types of characters. Security installer, integrators, end-users often have a negative attitude to a strong password. This password allows Hikvision, but are still considered weak. The password also has some requirements, it must contain eight characters and at least two of the four types of characters - uppercase letter, lowercase, numbers, special characters. Perhaps this measure is not too much increases the reliability of protection, but on the other side, this scale is simple. Without password modification, user can not get access to the camera, also can not connect it to the video surveillance system. This implementation measure can make IP cameras potentially less vulnerable.Īfter upgrading to the latest firmware, Hikvision system now requires the user to change the default password to start. The company recently released latest firmware version 5.3.0 to all IP network cameras. Since the hacking scandal in domestic market, Hikvision pays great attention to the protection of video surveillance system from hacking. The vulnerability was reported to the vendor in June, the company released firmware updates on September 19.IP camera utilizes network for video streaming and broadcasting, it's exposed to the possibility of hacking. The company states that the attacker can exploit the flaw only if he has access to the device network or the device has direct interface with the Internet. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.” reads the vendor’s advisory.Īccording to Hikvision, the vulnerability is due insufficient input validation and can be exploited by sending specially crafted messages to vulnerable devices. “A command injection vulnerability in the web server of some Hikvision product. The vulnerability impacts Hikvision cameras and NVRs, a list of affected products was published in the security advisory published by the vendor. The expert pointed out that every firmware developed since 2016 has been tested and found to be vulnerable. It will not be detectable by any logging on the camera itself.” “No username or password needed nor any actions need to be initiated by the camera owner.

“Given the deployment of these cameras at sensitive sites potentially even critical infrastructure is at risk,” continues the post. The researcher pointed out that the exploitation of the issue doesn’t require user interaction, the attacker only needs access to the http(s) server port (typically 80/443). Upon compromising the IP camera, an attacker can also use the hacked device to access internal networks posing a risk to the infrastructure that use the devices.
Hikvision dvr password hack full#
“This permits an attacker to gain full control of device with an unrestricted root shell, which is far more access than even the owner of the device has as they are restricted to a limited “protected shell” (psh) which filters input to a predefined set of limited, mostly informational commands.”
Hikvision dvr password hack code#
“The majority of the recent camera product ranges of Hikvision cameras are susceptible to a critical remote unauthenticated code execution vulnerability even with latest firmware (as of 21 June 2021).” wrote the expert. The vulnerability is an unauthenticated Remote Code Execution (RCE) vulnerability in Hikvision IP camera/NVR firmware, it was discovered by a security researcher that goes online with the moniker “Watchful IP.”
