D-Link and Vivotek have submitted their entries for “dumbest security vulnerability of 2013”, with Core Security turning up a variety of daft bugs in their IP cameras, including hard-coded backdoor passwords. The advisories are here for Vivotek and here for D-Link. D-Link has told Core Security it is preparing a fix, but the …
I've had a number of IP cameras over the years and it rarely takes more than 15 mins to find a way to access the feed without logging in. Seems to be an issue across the board and not just these brands.
Sometimes a private network is the only answer
I always assume any such gear is inherently insecure no matter who makes it or what their claims are, and insure it is on an isolated network. If you have a web server on the same VLAN as the cameras, you deserve what you get.
Analogue DVRs are also problematic. There's one brand of DVR - I forget which - that sends the full config (including passwords) in the background, in plain text, immediately after you log on with a read-only guest or demo account.
At what point do these 'blunders' become so extreme that people start to question intent?
Worst vulnerability ever
At first glance: "Video leaks as ASCII" made me think: Who-hoo, ASCII porn!
- Top Gear Tigers and Bingo Boilers: Farewell then, Phones4U
- Analysis iPhone 6: The final straw for Android makers eaten alive by the data parasite?
- Stephen Pie iPhone 6: Most exquisite MOBILE? No. It is the Most Exquisite THING. EVER
- First Crack Bloke buys iPHONE 6 and DROPS IT to SMASH on PURPOSE
- Early result from Scots indyref vote? NAW, Jimmy - it's a SCAM