Ubiquiti AirVision Video Stream Auth Bypass

Neils
2 min readFeb 15, 2016

--

In Ubitiquiti’s AirVision cameras, the RTSP stream is easily discovered and requires no authentication to view.

Example: For https://IP/login.cgi?uri=/ , if you do not have the login you cannot view the stream via the web portal, but if you go directly to the rtsp stream, rtsp://IP:554/live/ch00_0 , then you can view it with no login.

Discovery: I was curious how Shodan was able to pull down images from webcams that had a non-default authentication setup, but had their RTSP port exposed.

It turns out this is a commonly known method to setup third party apps/dvrs/etc in order to watch the camera.

So with that I filed a report in HackerOne, UBNT’s portal of choice for bug communications, on Dec 29, 2015.

On Jan 12th, 2016 :

Hi Neil,

What version are you seeing this on?

I replied back with all versions of AirVision were impacted.

Then on Feb 15th, 2016 the ticket was marked as closed:

Hi Neil,

airVision has been replaced with UniFi Video. Please test against latest UV version in the future. UV uses a random string for RTSP streams.

Thanks for testing.

So there you go. If you don’t update to Unifi Video, there is a good chance that someone else is watching your camera too. Or making gifs out of it.

For more reading on the topic of web cams exposed on the internet, Ars Technica did a nice article on the topic.

--

--