Vista VK2 IP Camera Vulnerability – 28th November 2023
Vista has become aware of vulnerabilities within the VK2 range of IP cameras.
We are currently working extensively with the Development Team to implement firmware updates for prompt resolution.
Details are provided below, including the products of the range and how they are each affected.
VULNERABILITIES
Description | Severity |
1. Ability to inject PHP and modify Admin password to gain access – via user_update.php | High |
2. Unsupported Web Software: PHP (PHP/7.3.7) | Medium |
3. Outdated Server Software: Lighttpd (/1.4.39) | Medium |
AFFECTED PRODUCTS AND VERSIONS
VK2 range cameras listed below exhibit the above issues. The latest affected firmware version is also given.
Once a firmware resolution is available for the below cameras, details of the updated version will be provided here. Please check regularly for updates to this announcement.
Model | Last Affected Version | Fixed Version |
VK2-HDX23IR-SMW | H_5213_PTZ_v2.6.2.enc | TBC |
VK2-HDX20-SMW | H_5229_PTZ_v1.3.3.enc | TBC |
VK2-4KX30IR-PM | H_7817_PTZ_v1.5.4.enc | TBC |
VK2L-2MPBIR36 | H_1212_v1.3.4.enc | TBC |
VK2L-2MPTIR36 | H_1212_v1.3.4.enc | TBC |
VK2-2MPXVFDIR28V12M | H_5213_v3.7.9.enc | TBC |
VK2-2MPXVRDIR37 | H_5213_v3.7.9.enc | TBC |
VK2-2MPXVRDIR28V12M | H_5213_v3.7.9.enc | TBC |
VK2-4MPXVRDIR28V12M | H_6411_v3.3.8.enc | TBC |
VK2-4MPXBIR28V12M | H_6411_v3.3.8.enc | TBC |
VK2-4KXVRDIR36V11M | H_7816_v2.0.1.enc | TBC |
VK2-12MP360EXTIR | H_7817_Fisheye_v1.5.4.enc | TBC |
All remaining Vista IP cameras of the VK2 range, essentially those not listed above, exhibit vulnerabilities numbered 2 to 3 only.
Note: they do not exhibit issue 1. inject PHP and modify Admin password to gain access.
These remaining VK2 cameras use older unsupported SOC hardware (System On a Chip) and are no longer supported with later firmware updates.
RECOMMENDATIONS – Recommendations are provided below to minimise impact – these also being “best practices” for any CCTV deployment.
- Provide a dedicated VLAN/Ethernet network for all CCTV devices so as to be separate from the corporate or customers LAN.
- Where connectivity between the networks is required, provide a firewall with relevant firewall rules and policies to block all unnecessary source IP addresses and ports.
- Apply IP whitelists to CCTV devices, such as cameras, to permit only those source IP addresses permitted access i.e. NVR recorder, engineering LAN etc.
- Make use of HTTPS on any CCTV device, where possible, for web login access.
- Ensure admin passwords are changed from their default and to something strong.
Please revisit this page to keep updated on firmware resolutions.