4.9 • 696 Ratings
🗓️ 29 October 2021
⏱️ 6 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello, welcome to the Friday, October 29th, 2021 edition of the Sandcentred Storm Center's Stormcast. |
0:08.9 | My name is Johannes Ulrich, and I'm recording from Alcobar, Saudi Arabia. |
0:14.9 | Back in May of 2014, we came across a botnet that was built around weak logins in Hickvision cameras. |
0:24.4 | This was sort of a precursor of what later then became Marai and the like, and back then |
0:29.8 | mostly used for crypto coin mining. |
0:32.7 | Well, Hickvision is in the news again, and this time maybe we'll have a chance to prevent |
0:37.1 | a similar botnet from |
0:38.7 | being built by actually patching systems. The vulnerability is not just a weak password, but a |
0:47.0 | vulnerability that allows arbitrary code execution without any authentication. A researcher who is using the alias, a watchful IP, found |
0:58.3 | the vulnerability, reported it to HickVision, and Hickvision now did release updates. There are not a lot of |
1:05.7 | details available at this point, and I applaud Watchful IP for holding back a little bit here to give everybody time |
1:13.0 | to patch, but the gist of it is that with this vulnerability, it's possible to add an additional |
1:21.7 | entry to the Etsy password file of the camera. And doing so, an attacker would be able to add an additional |
1:30.1 | administrative user that's actually more powerful than the default administrative user. |
1:36.2 | There is a default administrative user configured for the camera and protected with whatever |
1:42.7 | password the user sets, but that user actually has only access |
1:48.4 | to a restricted shell. With this vulnerability and by adding a new line to Etsy password, |
1:55.4 | an attacker would be able to add a new root user with whatever shell they would like to use. |
2:02.6 | Once the hacker has done so, then of course it's just a matter of using SSH or the web interface |
2:08.6 | to connect to the camera and execute additional code. |
2:14.6 | So this is something that has to be patched quickly. Like I said, an updated firmware has |
2:19.7 | been released. Now, there is a large number of affected devices out there. What's sometimes a |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.