Update on Buffer Overflow Vulnerability

UPDATE ON BUFFER OVERFLOW VULNERABILITY

August 15, 2018

Security Notification- Buffer Overflow Vulnerability in Some Hikvision IP Cameras Edited on August 15, 2018

SN No.: HSRC-201808-01
Edit: Hikvision Security Response Center (HSRC)
Initial release date: 2018-08-13
Update Date: 2018-08-23

Summary:
A buffer overflow vulnerability in the web server of some Hikvision IP cameras allows an
attacker to send a specially crafted message to affected devices. Due to the insufficient
input validation, a successful exploit can corrupt memory and lead to arbitrary code
execution or crash the process.

CVE ID:
CVE-2018-6414

Scoring:
CVSS v3 is adopted in this vulnerability scoring (http://www.first.org/cvss/specificationdocument)
Base score: 8.9 (AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:L/A:H)
Temporal score: 8.0 (E:P/RL:O/RC:C)

Affected versions and resolved version:
Information of affected versions and resolved versions:
Aug. 15, 2018 Update: Subsequent testing revealed that some of the products listed below are not susceptible to the Buffer Overflow vulnerability. Those products have been crossed out below.

IPC:


Product Name
 


Affected Version(s)
 


Resolved Version(s)
 

DS-2CD2xx5

V5.5.0 build170725 to V5.5.52 build180511

V5.5.61 build180718

DS-2CD2xx3

DS-2CD2X12FWD

V5.5.0 build170725 to V5.5.52 build 180427

V5.5.53 build180730

DS-2CD2X22FWD

DS-2CD2X42FWD

DS-2CD2X52F

DS-2CD4x26FWD

V5.5.0 build170914 to V5.5.52 build180601

V5.5.53 build180719

 

IPD*:


Product Name
 


Affected Version(s)
 


Resolved Version(s)
 

DS-2DF5xxx

V5.5.2 build171201 and previous versions*

V5.5.71 build180723

DS-2DF6xxx

DS-2DF7xxx

DS-2DF8xxx

DS-2DT6223

DS-2DE4xxxW

V5.5.6 build180408 and previous versions*

V5.5.71 build180725

DS-2DE5xxxW

DS-2DE7xxxW

* 2018/08/23 update: The affected version of IPD doesn't include V5.4.0 and previous versions. 


Precondition:

An attacker must have access to the device or the network on which the device is connected.
This is especially true for devices that are directly connected to the Internet.


Attack step:
Send a specially crafted message to the camera over the network.
Obtaining fixed firmware:
(See chart above)


Source of vulnerability information:
This vulnerability was reported to HSRC by Ori Hollander of VDOO Connected Trust LTD.,
an Israeli security company focused on IoT security.


Contact Us:
Should you have a security problem or concern, please contact the Hikvision Security
Response Center at hsrc@hikvision.com.

Hikvision.com uses strictly necessary cookies and related technologies to enable the website to function. With your consent, we would also like to use cookies to observe and analyse traffic levels and other metrics / show you targeted advertising / show you advertising on the basis of your location / tailor our website's content. For more information on cookie practices please refer to our cookie policy.

 

Contact Us

Get a better browsing experience

You are using a web browser we don’t support. Please try one of the following options to have a better experience of our web content.