D-Link and Vivotek have submitted their entries for “dumbest security vulnerability of 2013”, with Core Security turning up a variety of daft bugs in their IP cameras, including hard-coded backdoor passwords. The advisories are here for Vivotek and here for D-Link. D-Link has told Core Security it is preparing a fix, but the …
I've had a number of IP cameras over the years and it rarely takes more than 15 mins to find a way to access the feed without logging in. Seems to be an issue across the board and not just these brands.
Sometimes a private network is the only answer
I always assume any such gear is inherently insecure no matter who makes it or what their claims are, and insure it is on an isolated network. If you have a web server on the same VLAN as the cameras, you deserve what you get.
Analogue DVRs are also problematic. There's one brand of DVR - I forget which - that sends the full config (including passwords) in the background, in plain text, immediately after you log on with a read-only guest or demo account.
At what point do these 'blunders' become so extreme that people start to question intent?
Worst vulnerability ever
At first glance: "Video leaks as ASCII" made me think: Who-hoo, ASCII porn!
- Updated Microsoft Azure goes TITSUP (Total Inability To Support Usual Performance)
- The Return of BSOD: Does ANYONE trust Microsoft patches?
- Review Apple takes blade to 13-inch MacBook Pro with Retina display
- Munich considers dumping Linux for ... GULP ... Windows!
- Pic iPhone 6 flip tip slips in Aussie's clip: Apple's 'reversible USB' leaks