meta_pixel
Tapesearch Logo
Log in
SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Stormcast, Jan 14, 2025: Brute-Forcing Hikvision Devices, macOS SIP Bypass, Linux Rootkits, Aviatrix Exploits, and AWS Ransomware Tactics

SANS Internet Stormcenter Daily Cyber Security Podcast (Stormcast)

SANS ISC Handlers

Tech News, News, Technology

4.9696 Ratings

🗓️ 13 January 2025

⏱️ 8 minutes

🧾️ Download transcript

Summary

Daily 5 min cyber security news summary. News, patches, vulnerabilities and trends in information and network security. SANS ISC Stormcast, Jan 14, 2025: Brute-Forcing Hikvision Devices, macOS SIP Bypass, Linux Rootkits, Aviatrix Exploits, and AWS Ransomware Tactics

Transcript

Click on a timestamp to play from that location

0:00.0

Hello and welcome to the Tuesday, January 14th, 2025 edition of the Sands.

0:08.0

And it's Stormsaurus Stormcast. My name is Johannes Ulrich.

0:11.5

And I'm recording from Jacksonville, Florida.

0:14.6

Well, let's start out with some honeypot logs today.

0:18.7

We got an increase in requests for a password reset URL that's associated

0:24.1

with Hickvision IP cameras. Of course, Hickvision has been often attacked. This is not a new

0:32.0

vulnerability. First mention I found was in 2018, a blog post by Rasmid Murat's. And what Rasmus did identify

0:41.2

here was not just that the password reset feature didn't have a rate limit implemented,

0:47.7

but also that the code it used for password reset was predictable. The idea behind the feature isn't sort of that unusual and not necessarily bad,

1:00.5

where the user is receiving a one-time reset code that they can then use to reset their password.

1:08.8

Of course, that code should only be sent to an existing email

1:12.7

address, maybe an SMS or something like that. It should be random. It shouldn't be

1:18.4

prudforceable and it should be limited for a short time frame. Well, Hickvision managed to

1:26.5

violate most of these. Rasmussen started out with

1:31.1

simple prudforce idea. And that worked. There was no rate limit implemented. Apparently,

1:36.5

there was also no real sort of time limit implemented, which made it relatively straightforward

1:41.8

to prudforce the code. But in addition to proof force the code.

1:44.6

But in addition to that, the code itself wasn't random.

1:50.0

It was derived from UPNP data that actually can be retrieved without authentication.

1:56.6

So that made it pretty straightforward to bypass the authentication for the password reset,

2:03.4

which in turn then allows the attacker to reset the password for the administrator.

2:10.0

The lesson learned here is not so much that, well, IP cameras are vulnerable.

...

Please login to see the full transcript.

Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.

Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.

Copyright © Tapesearch 2025.