Older Hik cams keep reverting to factory?...

pozzello

Known around here
Joined
Oct 7, 2015
Messages
2,270
Reaction score
1,117
HI all, I have a few cameras in a remote install that keep reverting to factory settings.
various models and firmware versions: 2132 (dome), 2332 (bullet), 2122 (dome), etc...
Most are on a PoE switch, one is using a PoE injector.

When they disappear from my BI server, I find them with SADP and reconfigure.

I've disabled all UPNP and other settings on the cams that would cause them to go out to the Internet
(other than NTP), and my router also blocks all access to the internet from the cam IP's (other than port 123 for NTP). So i'm pretty sure they aren't being 'manipulated' externally...

I would have assumed they use NVRAM for config settings, but wondering if the cams have a battery inside that keeps configuration settings across power events, and if that battery were 'old', perhaps they lose their marbles when the power fluctuates or is disconnected?

Just fishin' for possible causes. I have extra cams available and may just replace the ones that keep being flakey, when i can get over there... TIA for any ideas...
 

bp2008

Staff member
Joined
Mar 10, 2014
Messages
12,673
Reaction score
14,017
Location
USA
I don't know, I would have guessed they were being hacked. Are you absolutely sure there aren't any port forwarding rules in place that could reach the cameras (or an NVR)? I've seen some routers require a reboot before they would drop the forwarding rules UPnP had created. Of course that can be hard to determine if your router doesn't list the UPnP-created forwarding rules.

I'm not sure how the cameras store their settings, but like you I would assume it is non-volatile memory.
 

alastairstevenson

Staff member
Joined
Oct 28, 2014
Messages
15,952
Reaction score
6,786
Location
Scotland
I would have assumed they use NVRAM for config settings, but wondering if the cams have a battery inside that keeps configuration settings across power events, and if that battery were 'old', perhaps they lose their marbles when the power fluctuates or is disconnected?
Non-volatile certainly, but in a file in a flash partition as opposed to battery-backed RAM.
Does your remote access have the capability to reach out from the location to the likes of ShieldsUp! to verify there is no external access inbound?
GRC | ShieldsUP! — Internet Vulnerability Profiling  
 

pozzello

Known around here
Joined
Oct 7, 2015
Messages
2,270
Reaction score
1,117
brilliant. the GRC scan showed i had port 80 and 554 open.
and sure enuf, surfing to port 80 from outside gets me the latest dead cam's interface!
i had disabled UPNP etc on the cams a few weeks back, but had not rebooted the router.
did that, port closed. used the hikvisionpasswordresethelper.exe to recover the cam.
wonder what someone might have installed on the cam(s) while they were exposed?
should prolly update them to a less vulnerable firmware...

thanx guys!
 

Tolting Colt Acres

Pulling my weight
Joined
Jun 7, 2016
Messages
378
Reaction score
153
just because they can't be hacked from the internet doesn't mean they cannot be hacked internally.
 

pozzello

Known around here
Joined
Oct 7, 2015
Messages
2,270
Reaction score
1,117
i've never been able to find fixup.sh script in the /dav directory after tftping the binary over...
 

alastairstevenson

Staff member
Joined
Oct 28, 2014
Messages
15,952
Reaction score
6,786
Location
Scotland
i've never been able to find fixup.sh script in the /dav directory after tftping the binary over...
Odd - and that was after an 'Update completed' message on the Hikvision tftp updater window with either brickfixv2EN or brickfixv2CN renamed as digicap.dav and then a power cycle?
 
Top