

- #Svat security camera system serial#
- #Svat security camera system update#
- #Svat security camera system Pc#
Moore warns that he hasn't actually tested the exploit on every brands of device that he listed to me. In addition to gaining access to the DVR through its web interface, someLuser also found that an attacker could gain complete control of the device's Linux operating system and run arbitrary commands, making it a potential point of attack for compromising other PCs and servers on the victim's network.
#Svat security camera system update#
Update 2: Both Swann and CW, the company that sells the Defender and SVAT brand of DVRs, now say they are investigating the issue. Update: A spokesperson for Zmodo writes in a statement that the company has developed its own firmware in models that it's sold since 2011, and claims that its in-house firmware "features a substantially higher level of security and has never been susceptible to the same intrusions as firmware developed by Ray Sharp."Īn URMET spokesperson also writes that "in 2011 an embedded encryption algorithm was implemented in URMET firmware that encrypts data before the transmission over the network thus increasing the level of security of URMET devices significantly," and that UPnP has been turned off by default in its devices. "Fifty-eight thousand homes and businesses are exposed because of the way these things cut holes in the firewall."īy checking the web interfaces of the vulnerable devices and analyzing the Ray Sharp firmware he downloaded from Swann's website, Moore was able to identify 18 companies that seem to use the faulty code: Swann, Lorex, URMET, KGuard, Defender, DSP Cop, SVAT, Zmodo, BCS, Bolide, EyeForce, Atlantis, Protectron, Greatek, Soyo, Hi-View, Cosmos, and J2000. "It’s just a boneheaded decision on the part of ," says Moore. He then used the scanning tool NMAP to dig up thousands of vulnerable machines visible on the Internet.

Rapid7's Moore confirmed someLuser's findings and traced the problem in the Swann machine to the device's firmware sold by Ray Sharp.
#Svat security camera system Pc#
That feature, designed to allow users to remotely access their video files via remote PC or phone, effectively cuts a hole in any firewall that would expose the device to attackers, too. To compound the problem, the DVRs automatically make themselves visible to external connections using a protocol known as Universal Plug And Play, (UPnP) which maps the devices' location to any local router that has UPnP enabled-a common default setting. "Anyone who can connect to port 9000 on the device can send this request and retrieve that information," said someLuser, who declined to reveal his real name when I reached him by instant message. And worse, he was able to use that unprotected connection to retrieve the login credentials for the DVR's web-based control panel. He found that commands sent to the device via a certain connection, port 9000, were accepted without any authentication.
#Svat security camera system serial#
"You could look at videos, pause and play, or just turn off the cameras and rob the store."Įarly last week a security researcher who goes by the name someLuser published a blog post detailing his dissection of a DVR built by the security firm Swann, disassembling the device and running tests on it via its serial port.

"The DVR gives you access to all their video, current and archived," says Moore. Moore, has discovered that 58,000 of the hackable video boxes, all of which use firmware provided by the Guangdong, China-based firm Ray Sharp, are accessible via the Internet. And one of the researchers, security firm Rapid7's chief security officer H.D. Eighteen brands of security camera digital video recorders (DVRs) are vulnerable to an attack that would allow a hacker to remotely gain control of the devices to watch, copy, delete or alter video streams at will, as well as to use the machines as jumping-off points to access other computers behind a company's firewall, according to tests by two security researchers.
