


- #Svat dvr firmware serial#
- #Svat dvr firmware pro#
- #Svat dvr firmware password#
- #Svat dvr firmware tv#
Once the module is loaded, enter the IP or IP range that you would like to test: msf auxiliary(raysharp_dvr_passwords) > set RHOSTS 192.168.0.0/24 Msf> use auxiliary/scanner/misc/raysharp_dvr_passwords For Metasploit console uses, enter the following command to select the appropriate module: $ sudo -s -E
#Svat dvr firmware password#
The Ray Sharp DVR Password Retriever module should be selected.
#Svat dvr firmware pro#
Metasploit Pro users should click on Modules and search for raysharp_dvr_passwords. One particular gem that stood out is listed below:Ī Metasploit module has been added that can be used to scan for vulnerable devices. To make matters worse, the version of OpenSSL compiled into this binary is OpenSSL 0.9.8j (), a version that is over three years old and rife with security problems.Ī quick review with IDA Pro identifies a number of trivial mistakes, including unbounded strcpy() calls. The hardcoded user agent, however, has caused concern before. This hardcoded credential seems to be related to the service, but this could not be confirmed. To make things interesting, the user-agent sent is_ "myclient 1.0 "_ and a hard-coded credential is present within the binary, which decodes as: Based on raysharp_dvr binary, the following dynamic DNS providers are supported: A quick analysis of the binary points out another feature - in order to make these systems even more hackable easier to access, they can automatically register their IP with a dynamic DNS service. In addition to being a terrible architecture, this may have inadvertent licensing implications. This binary implements almost all of the device's functionality, including everything from the web server to the CD-ROM writer based on cdrecord.
#Svat dvr firmware serial#
This provides an easy way to obtain the raysharp_dvr ELF image without rooting the device over the serial console. Interestingly enough, the beloved firmware-mod-kit package used for router tweaks also succeeds in unpacking the firmware provided by Swann. This list covered over 150 countries, with the largest portion (~19,000) located within the United States, followed by India (~6,000), and Italy (~5,700).

This returned over 58,000 unique IPs that were running a vulnerable DVR platform. These two signatures were matched against all HTTP services within the critical.io database. The two most common models could be detected with the following signatures: To determine the exposure level, I worked with someLuser to determine signatures for the web interface. For reference, the Ray Sharp firmware uses the "minupnp" open source implementation to perform this port mapping. This has the effect of exposing tens of thousands of vulnerable DVRs to the internet. Many home and small office routers enable UPnP by default. The Ray Sharp DVR platform supports the Universal Plug and Play (UPnP) protocol and automatically exposes the device to the internet if a UPnP-compatible router is responsible for network address translation (NAT) on the network. In this case, however, the situation is substantially worse. A vulnerable DVR that is protected by the corporate firewall is not much of a risk for most organizations. These types of flaws are common in embedded appliances, but the impact is limited by firewalls and other forms of network access control. In short - this provides remote, unauthorized access to security camera recording systems. someLuser's blog post includes a script for obtaining the clear-text passwords as well as a standalone exploit that yields a remote root shell on any vulnerable device. The vulnerabilities allow for unauthenticated access to the device configuration, which includes the clear-text usernames and passwords that, once obtained, can be used to execute arbitrary system commands root through a secondary flaw in the web interface. In addition to Ray Sharp, the exposures seem to affect rebranded DVR products by Swann, Lorex, URMET, KGuard, Defender, DEAPA/DSP Cop, SVAT, Zmodo, BCS, Bolide, EyeForce, Atlantis, Protectron, Greatek, Soyo, Hi-View, Cosmos, and J2000.
#Svat dvr firmware tv#
These DVRs are often used for closed-circuit TV (CCTV) systems and security cameras. On January 22, 2013, a researcher going by the name someLuser detailed a number of security flaws in the Ray Sharp DVR platform.
