D-Link firmware flaws could allow IP video stream spying

Core Security researchers found hard-coded credentials and other flaws in firmware used in a variety of IP video cameras

If you run a bank and use an IP video camera from D-Link, you may want to pay attention to this.

A number of IP-based surveillance video cameras made by D-Link have firmware vulnerabilities that could allow an attacker to intercept the video stream, according to security researchers.

Core Security, a company based in Boston that specializes in vulnerability detection and research, published on Monday details of five vulnerabilities in D-Link's firmware, which is wrapped into at least 14 of its products.

D-Link makes a variety of Internet-connected cameras that it sells to businesses and consumers. The cameras can record images and video and be controlled through Web-based control panels. Live feeds can be viewed on some mobile devices.

One of the vulnerable models, the DCS-5605/DCS-5635, has a motion-detection feature, which D-Link suggests in its marketing materials would be good for banks, hospitals and offices.

Core Security's researchers found it was possible to access without authentication a live video stream via the RTSP (real time streaming protocol) as well as an ASCII output of a video stream in the affected models. RTSP is an application-level protocol for transferring real-time data, according to the Internet Engineering Task Force.

The researchers also found a problem with the web-based control panel that would allow a hacker to input arbitrary commands. In another error, D-Link hard-coded login credentials into the firmware which "effectively serves as a backdoor, which allows remote attackers to access the RTSP video stream," Core Security said in its advisory.

The technical details are described in a post in the Full Disclosure section of Seclists.org, along with a list of the known affected products, some of which have been phased out by D-Link.

Core Security notified D-Link of the problem on March 29, according to a log of the two companies' interaction included in the posting on Full Disclosure. The log, written by Core, contains interesting details of how the two companies corresponded and apparently had a couple of disagreements.

According to Core, D-Link said it had an "unpublished bounty program for security vendors." Many companies have bug programs that reward researchers with cash or other incentives for finding security issues in their products and informing them before publicly releasing the details.

Around March 20, D-Link requested that Core Security sign a "memo of understanding" as part of the program, which Core rejected. The terms of the memo were not described. Core told D-Link "that receiving money from vendors may bias the view of the report."

The two companies had another minor run-in. D-Link told Core that it would release the patches and guidance to fix the issues on the D-Link Support Forum. D-Link would then wait a month before making a public announcement.

Core Security didn't like that suggestion. Last Wednesday, Core asked D-Link "for a clarification regarding the D-Link release date and notifies that releasing fixes to a privileged closed group and/or a closed forum or list is unacceptable."

D-Link's forum does have a login field, but it appears that anyone can view many of the posts without registering. D-Link came back a day later and said that patches are ready and would be posted onto its web site "over the next few days," Core wrote.

D-Link did not immediately respond to requests for comment. It was unclear from the company's support forum if the firmware updates had been publicly posted yet.

Core Security credited its researchers Francisco Falcon, Nahuel Riva, Martin Rocha, Juan Cotta, Pablo Santamaria and Fernando Miranda with finding the problems.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags securityD-Linkconsumer electronicsExploits / vulnerabilitiesCore Security

Keep up with the latest tech news, reviews and previews by subscribing to the Good Gear Guide newsletter.

Jeremy Kirk

IDG News Service
Show Comments

Brand Post

Most Popular Reviews

Latest Articles

Resources

PCW Evaluation Team

Emily Tyson

MSI GE63 Raider

If you’re looking to invest in your next work horse laptop for work or home use, you can’t go wrong with the MSI GE63.

Laura Johnston

MSI GS65 Stealth Thin

If you can afford the price tag, it is well worth the money. It out performs any other laptop I have tried for gaming, and the transportable design and incredible display also make it ideal for work.

Andrew Teoh

Brother MFC-L9570CDW Multifunction Printer

Touch screen visibility and operation was great and easy to navigate. Each menu and sub-menu was in an understandable order and category

Louise Coady

Brother MFC-L9570CDW Multifunction Printer

The printer was convenient, produced clear and vibrant images and was very easy to use

Edwina Hargreaves

WD My Cloud Home

I would recommend this device for families and small businesses who want one safe place to store all their important digital content and a way to easily share it with friends, family, business partners, or customers.

Walid Mikhael

Brother QL-820NWB Professional Label Printer

It’s easy to set up, it’s compact and quiet when printing and to top if off, the print quality is excellent. This is hands down the best printer I’ve used for printing labels.

Featured Content

Product Launch Showcase

Latest Jobs

Don’t have an account? Sign up here

Don't have an account? Sign up now

Forgot password?