In honor of Memorial Day, No-IP Support will be closed Monday, May 29, 2017.
Priority Support phone calls and tickets will be accepted from 10 am to 5 pm PST, but all other calls will not be accepted until the following business day. Upgrade to Priority Support if you need immediate assistance, or check out our extensive Knowledge Base for helpful troubleshooting articles and support guides.
Support will re-open for normal business hours Tuesday, May 30 at 6:30 am PDT.
Check out the No-IP collection of tech jokes that are sure to make you laugh, or not. Just click the image to view a larger version. Also, be sure to share your favorites with all your friends. Have an idea for a meme? We’d love to hear it! Leave your idea in the comments below. #noipcom #dadjokes
Hikvision, a Chinese manufacturer of video surveillance equipment, recently announced that some of their cameras are exposed to a security vulnerability that when used, allows attackers to gain admin privileges on Hikvision IP Cameras to tamper with device information.
Long Story Short
Some Hikvision IP cameras are subject to two bugs that allow attackers to access sensitive information and gain admin privileges.
I own a Hikvision camera, what should I do?
Hikvision has released updated firmware for the affected cameras. You must upgrade your firmware. Once the device is upgraded to the latest firmware, the issue is resolved.
The following cameras are affected:
Updated firmware: V5.4.5 build 170123 and later
Updated firmware: V5.4.5 Build 170123 and later
Updated firmware: V5.4.5 Build 170124 and later
DS- 2CD4x2xFWD Series
Updated firmware: V5.4.5 Build 170228 and later
Updated firmware: V5.4.5 Build 170302 and later
Updated firmware: V5.4.9 Build 170123 and later
Updated firmware: V5.4.5 Build 170206 and later
More information about the backdoor and how to upgrade your camera to the latest firmware is available via Hikvision. Another update to the bug has also been posted by Hikvision here.
Do you own a Hikvision camera? Was your camera affected by the exploit?