module
Hikvision IP Camera Unauthenticated Password Change Via Improper Authentication Logic
| Disclosed | Created |
|---|---|
| Sep 23, 2017 | Sep 24, 2022 |
Disclosed
Sep 23, 2017
Created
Sep 24, 2022
Description
Many Hikvision IP cameras contain improper authentication logic which allows unauthenticated impersonation of any configured user account.
The vulnerability has been present in Hikvision products since 2014. In addition to Hikvision-branded devices, it
affects many white-labeled camera products sold under a variety of brand names.
Hundreds of thousands of vulnerable devices are still exposed to the Internet at the time
of publishing (shodan search: '"App-webs" "200 OK"'). Some of these devices can never be patched due to to the
vendor preventing users from upgrading the installed firmware on the affected device.
This module utilizes the bug in the authentication logic to perform an unauthenticated password change of any user account on
a vulnerable Hikvision IP Camera. This can then be utilized to gain full administrative access to the affected device.
The vulnerability has been present in Hikvision products since 2014. In addition to Hikvision-branded devices, it
affects many white-labeled camera products sold under a variety of brand names.
Hundreds of thousands of vulnerable devices are still exposed to the Internet at the time
of publishing (shodan search: '"App-webs" "200 OK"'). Some of these devices can never be patched due to to the
vendor preventing users from upgrading the installed firmware on the affected device.
This module utilizes the bug in the authentication logic to perform an unauthenticated password change of any user account on
a vulnerable Hikvision IP Camera. This can then be utilized to gain full administrative access to the affected device.
Authors
Monte Crypto
h00die-gr3y [email protected]
h00die-gr3y [email protected]
References
Module Options
To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.