Hikvision Camera Backdoor

Tomas Savenas
Nov 2 · 1 min read

A cybersecurity incident to occur probability is slim to none in public catering facilities. Although it is relatively easy to exploit unpatched cameras or other devices on the same network. Business owners focused on their KPIs. They invest in those things which are matters today. Most likely they have a limited budget for IT security.

I had a couple of requests to test local network security and I have seen vulnerable “Hikvision” cameras. An exploit is a publicly available and simple HTTP request. Full disclosure of this backdoor ”Access control bypass in Hikvision IP Cameras” [1].

I don’t want to spend more time on checking every I wrote the Nmap script to check the whole subnet faster [2]

git clone https://github.com/savenas/nmap-scripts
cd nmap-scripts
nmap --script=http-hikvision-backdoor.nse -p 80,443 192.168.0.1/24 -Pn --open

There is a working python exploit script is on exploit-db [3]

Reference:

#1 https://seclists.org/fulldisclosure/2017/Sep/23
#2 https://github.com/savenas/nmap-scripts
#3 https://www.exploit-db.com/exploits/44328
Tomas Savenas

Written by

A guy who shares a simplified form of “know-how”. Every weekend a new story. I’m not asking to follow me, although I appreciate your feedback.

Welcome to a place where words matter. On Medium, smart voices and original ideas take center stage - with no ads in sight. Watch
Follow all the topics you care about, and we’ll deliver the best stories for you to your homepage and inbox. Explore
Get unlimited access to the best stories on Medium — and support writers while you’re at it. Just $5/month. Upgrade