CVE-2018-20955
📋 TL;DR
Swann SWWHD-INTCAM-HD security cameras had a hardcoded root password 'twipc' that allowed attackers to gain FTP access with root privileges. This affected all customers using these devices before the vendor's migration program. The vulnerability was completely mitigated by August 31, 2020 when all affected customers were migrated to new systems.
💻 Affected Systems
- Swann SWWHD-INTCAM-HD security cameras
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete compromise of the security camera system, allowing attackers to view live feeds, manipulate recordings, install malware, pivot to internal networks, and permanently disable security monitoring.
Likely Case
Unauthorized access to camera feeds and recordings, potential privacy violations, and use of compromised devices as footholds for further network attacks.
If Mitigated
No impact as all affected systems were migrated to new hardware by the vendor's deadline.
🎯 Exploit Status
Exploitation is trivial - attackers simply need to connect via FTP using root:twipc credentials. Public blog posts detail the exploitation process.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: N/A
Vendor Advisory: https://www.swann.com/au/safe-by-swann-upgrade
Restart Required: No
Instructions:
1. Contact Swann support to verify migration status. 2. If still using affected hardware, immediately replace with Safe by Swann system. 3. Disconnect affected devices from network until replacement.
🔧 Temporary Workarounds
Network Isolation
linuxCompletely isolate affected cameras from all networks including internet
iptables -A INPUT -s [CAMERA_IP] -j DROP
iptables -A OUTPUT -d [CAMERA_IP] -j DROP
FTP Service Disable
linuxDisable FTP service on affected devices if possible
killall ftpd
chmod -x /usr/sbin/ftpd
🧯 If You Can't Patch
- Immediately disconnect device from all networks
- Physically remove and destroy affected hardware
🔍 How to Verify
Check if Vulnerable:
Attempt FTP connection to camera IP on port 21 using credentials root:twipc. If connection succeeds, device is vulnerable.
Check Version:
N/A - This is a hardware migration, not a software patch
Verify Fix Applied:
Check with Swann support to confirm device was migrated to Safe by Swann platform. Attempt FTP connection should fail.
📡 Detection & Monitoring
Log Indicators:
- Failed FTP authentication attempts
- Successful FTP logins as root
- Unusual file transfers from camera
Network Indicators:
- FTP connections to camera devices
- Unusual outbound traffic from cameras
- Port scanning from camera IPs
SIEM Query:
source="ftp.log" (user="root" OR password="twipc") OR dest_ip="[CAMERA_IP]" proto="ftp"