The APIs allow a user to perform a variety of actions on the remote device. ONVIF-conformant products can be seamlessly accessed via vendor-agnostic software through a set of standardized Application Programming Interfaces (APIs). Open Network Video Interface Forum (ONVIF)Īccording to the official website, ONVIF is an open industry forum that provides and promotes standardized interfaces for effective interoperability of IP-based physical security products. In this blog we introduce the ONVIF standard, outline the WS-UsernameToken authentication mechanism, provide details on the observed vulnerability, and share specific remediations that can be applied by end users. This vulnerability could be abused by attackers to compromise network cameras by sniffing a previous unencrypted ONVIF interaction and replaying the credentials in a new request towards the camera. We’re publishing the details of a new vulnerability (tracked under CVE-2022-30563) affecting the implementation of the Open Network Video Interface Forum (ONVIF) WS-UsernameToken authentication mechanism in some IP cameras developed by Dahua, a very popular manufacturer of IP-based surveillance solutions.
This research led to the discovery of vulnerabilities in Axis and ThroughTek devices. Last year, Nozomi Networks Labs conducted extensive security research on multiple IP cameras and video surveillance systems.