Matt Posted July 12, 2013 Report Posted July 12, 2013 Description : Multiple cameras suffer from having hardcoded backdoor accounts allowing for authentication bypass and code execution. Included are various 3S Vision, Asante Voyager, and ALinking cameras.Author : Roberto PaleariSource : 3S Vision / Asante Voyager / ALinking Hardcoded Accounts ? Packet StormCode : Hard-coded accounts on multiple network cameras===============================================[ADVISORY INFORMATION]Title: Hard-coded accounts on multiple network camerasDiscovery date: 05/06/2013Release date: 11/07/2013Advisory URL: http://goo.gl/82RlbCredits: Roberto Paleari (roberto.paleari@emaze.net, @rpaleari) Alessandro Di Pinto (alessandro.dipinto@emaze.net, @adipinto)[VULNERABILITY INFORMATION]Class: Authentication bypass, command execution[AFFECTED PRODUCTS]We confirm the presence of the security vulnerability on the followingproducts/firmware versions: * 3S Vision N1072 network camera, firmware version v1.07_STD-1 * 3S Vision N1073 network camera, firmware version v1.02_STD-1 * 3S Vision N3071 network camera, firmware version v1.05_STD-1 * Asante Voyager 1 network camera, firmware version v2.08 * Asante Voyager 2 network camera, firmware version v2.08 * ALinking ALC-9451/ALC-9452 network cameras, firmware version v1.33Several other device manufacturers, models and firmware versions are probablyalso vulnerable, but they were not checked, mainly due to time constraints.[VULNERABILITY DETAILS] The web server and RTSP daemon of the affected cameras include an hard-codeduser account. Different device manufacturers (and camera models) use differenthard-coded accounts. This issue can be abused by remote attackers to gainadministrative access to the affected devices.In the following, we report the hard-coded accounts for 3S Vision and Asantenetwork cameras, as these are the only device manufacturers that were contactedand replies to our inquiries.- 3S Vision cameras * HTTP & RTSP account: "3sadmin:27988303"- Asante Voyager 1 network cameras * HTTP account: "uniform:uic7799" * RTSP account: "uicrd:xu06m3"- Asante Voyager 2 network cameras * HTTP & RTSP account: "uicrd:xu06m3"As the account is hard-coded in the web server and RTSP server binary files, itcannot be changed by end-users without upgrading the whole firmware image (ormanually patching the executable files).[REMEDIATION] Asante provided Emaze with a patched firmware image that disables thehard-coded account. At the time of writing, this software version is still notavailable through the company's web site, but will probably be released verysoon. To the best of our knowledge, other device manufacturers have notaddressed the issues described in this advisory, thus no updated firmwareversions are available for their products.[COPYRIGHT]Copyright(c) Emaze Networks S.p.A 2013, All rights reserved worldwide.Permission is hereby granted to redistribute this advisory, providing that nochanges are made and that the copyright notices and disclaimers remain intact.[DISCLAIMER]Emaze Networks S.p.A is not responsible for the misuse of the informationprovided in our security advisories. These advisories are a service to theprofessional security community. There are NO WARRANTIES with regard to thisinformation. Any application or distribution of this information constitutesacceptance AS IS, at the user's own risk. This information is subject to changewithout notice. Quote