The IoT search engine ZoomEye has cached login passwords for tens of thousands of Dahua DVRs, the discovery was made by security researcher Ankit Anubhav, Principal Researcher at NewSky Security.
Anubhav explained that the passwords are related to Dahua DVRs running very old firmware that is known to be affected by a five-year-old vulnerability tracked as CVE-2013-6117.
Even if the vulnerability has been patched, many Dahua devices are still running ancient firmware.
The CVE-2013-6117 was discovered by the security expert Jake Reynolds and affects Dahua DVR 2.608.0000.0 and 2.608.GV00.0. The flaw could be exploited by remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777.
An attacker just needs to initiate a raw TCP connection on a vulnerable Dahua DVR on port 37777 to send the exploit code that triggers the issue.
Once the Dahua device receives this code, it will respond with DDNS credentials for accessing the device, and other data, all in plaintext.
Just to make things clear to weaponize the exploit, one needs to connect to port 37777 on raw TCP + send the following message to get the ddns creds
"xa3x00x00x00x00x00x00x00x63x6fx6ex66x69x67x00x00x8cx00x00x00x00x00x00x00x00x00x00x00x00x00x00x00" https://t.co/Z6I4uVp9sK
— Ankit Anubhav (@ankit_anubhav) July 13, 2018
Wow and how did I miss this.
13900+ of these devices have their password as "123456"
Check here https://t.co/1fSJX4KcWG#iot #security #failThis specific case was brought to my attention by another known botnet operator. So again, RIP to these devices. https://t.co/OAzmy7GnY8
— Ankit Anubhav (@ankit_anubhav) July 13, 2018
Anubhav explained that ZoomEye scans port 37777 caching the output in plaintext, this means that everyone that with a ZoomEye account can scrap results to obtain the credentials of tens of thousands
Anubhav notified the issue to ZoomEye asking it to remove the passwords from its cached results, but the expert is still waiting for a reply.
The expert explained that he discovered the issue after reading a post published by the author of the BrickerBot IoT malware that exploited the flaw to hacked hijack and brick Dahua DVRs in the past.
[adrotate banner=”9″] | [adrotate banner=”12″] |
(Security Affairs – IoT search engine ZoomEye, Dahua DVRs)
[adrotate banner=”5″]
[adrotate banner=”13″]