Inside this post, we examine how the exploit works, how it is being used, how what percentage of devices are vulnerable, and Hikvision's failure to respond to the exploit's release. We also show using password reset tool to take over a camera: We produced the following video, showing just how simple it is to utilize this exploit to retrieve an image snapshot and system information from a camera. Plus, IPVM has set up a vulnerable Hikvision IP camera so members can test and better understand the exploit. Hikvision, again, has been silent, failing to inform and warn its dealers of this new disclosure.Hikvision's heretofore disclosure significantly misled its dealer to the severity of the backdoor.A clear majority of Hikvision IP cameras remain vulnerable. ![]() The exploit is already being repurposed as a 'tool', distributed online. ![]() ![]()
0 Comments
Leave a Reply. |