Independent researchers have uncovered a major vulnerability in many Dahua products, allowing remote unauthorised admin access via the web. The researchers say that a number of the Dahua HDCVI and IP cameras and recorders are impacted. Cesare Garlati, Chief Security Strategist at the prpl Foundation commented below.
Cesare Garlati, Chief Security Strategist at the prpl Foundation:
“We need to change the mindset of industry and government to realise that there is no such thing as a “secure backdoor”. Hackers have already used backdoors to illegally access networks (as seen in the Deutsche Telekom attack last year) and they will continue doing it until we learn that it is not possible to have a backdoor and still be completely secure. In the case of Deutsche Telekom they were able to issue a patch, but companies need to be more proactive rather than reactive. If we don’t take steps now to improve security within devices at the development level, the results could be catastrophic, especially when used to capture data and images like with a surveillance camera. At best, people’s privacy and civil liberties will be affected and at worst, poor security controls will mean cybercriminals will have access to a whole host of information they can use for surveillance or other nefarious purposes. By using open source, forging a root of trust in hardware and security by separation using hardware virtualization, manufacturers of IoT devices will be able to ensure they are secure and stop devices like the Chinese surveillance cameras being hacked. Interoperable, open standards are the key requirement for developers in order to improve IoT security even in the smallest of connected devices, and are outlined in prpl’s Security Guidance for Critical Areas of Embedded Computing document.”
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional
Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes.The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.