D-Link and Vivotek have submitted their entries for “dumbest security vulnerability of 2013”, with Core Security turning up a variety of daft bugs in their IP cameras, including hard-coded backdoor passwords. The advisories are here for Vivotek and here for D-Link. D-Link has told Core Security it is preparing a fix, but the …
I've had a number of IP cameras over the years and it rarely takes more than 15 mins to find a way to access the feed without logging in. Seems to be an issue across the board and not just these brands.
Sometimes a private network is the only answer
I always assume any such gear is inherently insecure no matter who makes it or what their claims are, and insure it is on an isolated network. If you have a web server on the same VLAN as the cameras, you deserve what you get.
Analogue DVRs are also problematic. There's one brand of DVR - I forget which - that sends the full config (including passwords) in the background, in plain text, immediately after you log on with a read-only guest or demo account.
At what point do these 'blunders' become so extreme that people start to question intent?
Worst vulnerability ever
At first glance: "Video leaks as ASCII" made me think: Who-hoo, ASCII porn!
- Review This is why we CAN have nice things: Samsung Galaxy Alpha
- MEN: For pity's sake SLEEP with LOTS of WOMEN - and avoid Prostate Cancer
- Ex-Soviet engines fingered after Antares ROCKET launch BLAST
- Vid BONFIRE of the MEGA-BUCKS: $200m+ BURNED in SECONDS in Antares launch blast
- Hate the BlackBerry Z10 and Passport? How about this dusty old flashback instead?