D-Link firmware flaws could allow IP video stream spying

Core Security researchers found hard-coded credentials and other flaws in firmware used in a variety of IP video cameras

If you run a bank and use an IP video camera from D-Link, you may want to pay attention to this.

A number of IP-based surveillance video cameras made by D-Link have firmware vulnerabilities that could allow an attacker to intercept the video stream, according to security researchers.

Core Security, a company based in Boston that specializes in vulnerability detection and research, published on Monday details of five vulnerabilities in D-Link's firmware, which is wrapped into at least 14 of its products.

D-Link makes a variety of Internet-connected cameras that it sells to businesses and consumers. The cameras can record images and video and be controlled through Web-based control panels. Live feeds can be viewed on some mobile devices.

One of the vulnerable models, the DCS-5605/DCS-5635, has a motion-detection feature, which D-Link suggests in its marketing materials would be good for banks, hospitals and offices.

Core Security's researchers found it was possible to access without authentication a live video stream via the RTSP (real time streaming protocol) as well as an ASCII output of a video stream in the affected models. RTSP is an application-level protocol for transferring real-time data, according to the Internet Engineering Task Force.

The researchers also found a problem with the web-based control panel that would allow a hacker to input arbitrary commands. In another error, D-Link hard-coded login credentials into the firmware which "effectively serves as a backdoor, which allows remote attackers to access the RTSP video stream," Core Security said in its advisory.

The technical details are described in a post in the Full Disclosure section of Seclists.org, along with a list of the known affected products, some of which have been phased out by D-Link.

Core Security notified D-Link of the problem on March 29, according to a log of the two companies' interaction included in the posting on Full Disclosure. The log, written by Core, contains interesting details of how the two companies corresponded and apparently had a couple of disagreements.

According to Core, D-Link said it had an "unpublished bounty program for security vendors." Many companies have bug programs that reward researchers with cash or other incentives for finding security issues in their products and informing them before publicly releasing the details.

Around March 20, D-Link requested that Core Security sign a "memo of understanding" as part of the program, which Core rejected. The terms of the memo were not described. Core told D-Link "that receiving money from vendors may bias the view of the report."

The two companies had another minor run-in. D-Link told Core that it would release the patches and guidance to fix the issues on the D-Link Support Forum. D-Link would then wait a month before making a public announcement.

Core Security didn't like that suggestion. Last Wednesday, Core asked D-Link "for a clarification regarding the D-Link release date and notifies that releasing fixes to a privileged closed group and/or a closed forum or list is unacceptable."

D-Link's forum does have a login field, but it appears that anyone can view many of the posts without registering. D-Link came back a day later and said that patches are ready and would be posted onto its web site "over the next few days," Core wrote.

D-Link did not immediately respond to requests for comment. It was unclear from the company's support forum if the firmware updates had been publicly posted yet.

Core Security credited its researchers Francisco Falcon, Nahuel Riva, Martin Rocha, Juan Cotta, Pablo Santamaria and Fernando Miranda with finding the problems.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Error: Please check your email address.
Rocket to Success - Your 10 Tips for Smarter ERP System Selection

Tags Core Securityconsumer electronicssecurityD-LinkExploits / vulnerabilities

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Sarah Ieroianni

Brother QL-820NWB Professional Label Printer

The print quality also does not disappoint, it’s clear, bold, doesn’t smudge and the text is perfectly sized.

Ratchada Dunn

Sharp PN-40TC1 Huddle Board

The Huddle Board’s built in program; Sharp Touch Viewing software allows us to easily manipulate and edit our documents (jpegs and PDFs) all at the same time on the dashboard.

George Khoury

Sharp PN-40TC1 Huddle Board

The biggest perks for me would be that it comes with easy to use and comprehensive programs that make the collaboration process a whole lot more intuitive and organic

David Coyle

Brother PocketJet PJ-773 A4 Portable Thermal Printer

I rate the printer as a 5 out of 5 stars as it has been able to fit seamlessly into my busy and mobile lifestyle.

Kurt Hegetschweiler

Brother PocketJet PJ-773 A4 Portable Thermal Printer

It’s perfect for mobile workers. Just take it out — it’s small enough to sit anywhere — turn it on, load a sheet of paper, and start printing.

Matthew Stivala

HP OfficeJet 250 Mobile Printer

The HP OfficeJet 250 Mobile Printer is a great device that fits perfectly into my fast paced and mobile lifestyle. My first impression of the printer itself was how incredibly compact and sleek the device was.

Featured Content

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?