{"id":19926,"date":"2022-08-23T16:10:21","date_gmt":"2022-08-24T00:10:21","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2022\/08\/23\/news-13659\/"},"modified":"2022-08-23T16:10:21","modified_gmt":"2022-08-24T00:10:21","slug":"news-13659","status":"publish","type":"post","link":"http:\/\/www.palada.net\/index.php\/2022\/08\/23\/news-13659\/","title":{"rendered":"Thousands of Hikvision video cameras remain unpatched and vulnerable to takeover"},"content":{"rendered":"<p>In September&nbsp;2021 we&nbsp;told you about <a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2021\/09\/patch-now-insecure-hikvision-security-cameras-can-be-taken-over-remotely\">insecure Hikvision security cameras<\/a>&nbsp;that were&nbsp;ready to be taken over remotely.<\/p>\n<p>However, according to a <a href=\"https:\/\/www.cyfirma.com\/research-datasheets-whitepapers\/\" target=\"_blank\">whitepaper published by CYFIRMA<\/a>, tens of thousands of systems used by 2,300 organizations across 100 countries have still not applied the security update, and are therefore vulnerable to exploitation.<\/p>\n<h2>The vulnerability<\/h2>\n<p>According to the researcher that reported it last year, the vulnerability has&nbsp;existed at least since 2016. All an attacker needs is access to the http(s) server port (typically 80\/443). No username or password is needed, nor are any actions needed from the camera owner, and the attack&nbsp;is not detectable by any logging on the camera itself. A&nbsp;cybercriminal could exploit the vulnerability to launch a command injection attack by sending some messages with specially crafted commands.<\/p>\n<h2>The patch<\/h2>\n<p>The flaw is tracked as CVE-2021-36260 and was addressed by Hikvision via a firmware update in September 2021. The critical bug received a 9.8 out of 10 on the CVSS scale of severity, clearly demonstrated by the fact that it gives the attacker to gain even more access than the owner of the device has, since the owner&nbsp;is restricted to a limited protected shell (psh) which filters input to a predefined set of limited, mostly informational commands.<\/p>\n<h2>The abuse<\/h2>\n<p>One possible exploit of this vulnerability was published by <a href=\"https:\/\/packetstormsecurity.com\/files\/164603\" target=\"_blank\">packet storm<\/a> in October 2021.<\/p>\n<p>In December 2021, <a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/moobot-botnet-spreading-via-hikvision-camera-vulnerability\/\" target=\"_blank\">BleepingComputer<\/a> reported that a <a href=\"https:\/\/www.malwarebytes.com\/what-was-the-mirai-botnet\">Mirai<\/a>-based botnet called Moobot was spreading aggressively via exploiting this vulnerability in the webserver of many Hikvision products.<\/p>\n<p>A <a href=\"https:\/\/www.malwarebytes.com\/blog\/detections\/trojan-metasploit\">Metasploit<\/a> module based on the vulnerability was published by <a href=\"https:\/\/packetstormsecurity.com\/files\/166167\" target=\"_blank\">packet storm<\/a> in February of 2022.<\/p>\n<p>The Cybersecurity &amp; Infrastructure Security Agency (CISA) added the vulnerability to&nbsp;its list <a href=\"https:\/\/www.cisa.gov\/known-exploited-vulnerabilities-catalog\" target=\"_blank\">of known exploited vulnerabilities<\/a> that should be patched by January 24, 2022.<\/p>\n<h2>Unpatched<\/h2>\n<p>Given the amount of available information, it is trivial even for a &ldquo;copy&nbsp;and paste criminal,&rdquo; to make use of the unpatched cameras.<\/p>\n<p>Of an analyzed sample of 285,000 internet-facing Hikvision web servers, CYFIRMA found roughly 80,000 of them were still vulnerable to exploitation. Most of these are located in China and the United States, while Vietnam, the UK, Ukraine, Thailand, South Africa, France, the Netherlands, and Romania all count above 2,000 vulnerable cameras.<\/p>\n<h2>Mitigation<\/h2>\n<p>If you are in doubt whether you are using a vulnerable product, there is a list of the vulnerable firmware versions in the researchers&#8217; post. Hikvision says you should download the latest firmware for your device from the global firmware portal.<\/p>\n<p>In general it is not a good idea to make your cameras accessible from the internet and if you do, put them behind a VPN.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/thousands-of-hikvision-video-cameras-remain-unpatched-and-vulnerable-to-takeover\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<table cellpadding='10'>\n<tr>\n<td valign='top' align='left'>\n<p>Categories: <a href='https:\/\/www.malwarebytes.com\/blog\/category\/news' rel='category tag'>News<\/a><\/p>\n<p>Tags: Hikvision<\/p>\n<p>Tags:  CVE-2021-36260<\/p>\n<p>Tags:  metasploit<\/p>\n<p>Tags:  Mirai<\/p>\n<p>Tags:  Moobot<\/p>\n<p>Tags:  <\/p>\n<p>A patch has been available since September 2021, yet tens of thousands of systems used by 2,300 organizations across 100 countries have still not applied the security update.<\/p>\n<table width='100%'>\n<tr>\n<td align=right>\n<p><b>(<a href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/thousands-of-hikvision-video-cameras-remain-unpatched-and-vulnerable-to-takeover' title='Thousands of Hikvision video cameras remain unpatched and vulnerable to takeover'>Read more&#8230;<\/a>)<\/b><\/p>\n<\/td>\n<\/tr>\n<\/table>\n<\/td>\n<\/tr>\n<\/table>\n<p>The post <a rel='nofollow' href='https:\/\/www.malwarebytes.com\/blog\/news\/2022\/08\/thousands-of-hikvision-video-cameras-remain-unpatched-and-vulnerable-to-takeover'>Thousands of Hikvision video cameras remain unpatched and vulnerable to takeover<\/a> appeared first on <a rel='nofollow' href='https:\/\/www.malwarebytes.com'>Malwarebytes Labs<\/a>.<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[27347,11610,24298,10400,27348,32],"class_list":["post-19926","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-cve-2021-36260","tag-hikvision","tag-metasploit","tag-mirai","tag-moobot","tag-news"],"_links":{"self":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19926","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=19926"}],"version-history":[{"count":0,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/19926\/revisions"}],"wp:attachment":[{"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=19926"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=19926"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=19926"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}