{"id":18034,"date":"2017-08-08T11:11:48","date_gmt":"2017-08-08T16:11:48","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=18034"},"modified":"2020-08-11T14:04:05","modified_gmt":"2020-08-11T19:04:05","slug":"devils-ivy-update","status":"publish","type":"post","link":"https:\/\/www.een.com\/pt-br\/blog\/devils-ivy-update\/","title":{"rendered":"Devil&#8217;s Ivy Update"},"content":{"rendered":"<p>In July 2017, cyber security researchers discovered a serious flaw, which they named \u201cDevil\u2019s Ivy\u201d, that exists in nearly all cameras supporting the popular ONVIF specification. The flaw allows hackers to take full control of ONVIF-compliant cameras.<\/p>\n<p>Most camera makes and models are vulnerable, including top brand high-quality cameras. Within days a few major manufacturers issued firmware updates that correct the flaw. It is up to camera owners and servicing contractors to update the cameras. There is no telling which manufacturers will make firmware corrections for their cameras, or how many of the millions of vulnerable installed cameras will actually be updated.<\/p>\n<p>When vulnerable cameras and recorders can be contacted directly from the Internet, they can be easily attacked and exploited by cyber criminals and other attackers. Strong cyber security controls and constant vigilance are needed to avoid recorders being compromised. Any device connected to the Internet is typically attacked or probed hundreds of times per day, especially DVRs and NVRs, as they are a high-value target.<\/p>\n<p>This is a clear example of why segmenting your network or utilizing technology like Eagle Eye Camera Cyber Lockdown is critical.\u00a0<a href=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/05\/Camera-Cyber-Lockdown-White-Paper-Final-20170808.pdf\">Eagle Eye Camera Cyber Lockdown<\/a> isolates the cameras from other networks so that they cannot be maliciously attacked nor utilized if they contain a trojan or other malware.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignnone size-medium wp-image-18036\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-300x175.jpeg\" alt=\"devils-ivy\" width=\"614\" height=\"358\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-300x175.jpeg 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-1024x597.jpeg 1024w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-100x58.jpeg 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-200x117.jpeg 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-400x233.jpeg 400w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-600x350.jpeg 600w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy-800x467.jpeg 800w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/08\/devils-ivy.jpeg 1068w\" sizes=\"(max-width: 614px) 100vw, 614px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In July 2017, cyber security researchers discovered a serious flaw, which they named \u201cDevil\u2019s Ivy\u201d, that exists in nearly all cameras supporting the popular ONVIF specification. The flaw allows hackers &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/pt-br\/blog\/devils-ivy-update\/\"> <span class=\"screen-reader-text\">Devil&#8217;s Ivy Update<\/span> Leia mais &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":18039,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-18034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts\/18034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/comments?post=18034"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/posts\/18034\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/media\/18039"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/media?parent=18034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/categories?post=18034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/pt-br\/wp-json\/wp\/v2\/tags?post=18034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}