Thread Rating:
  • 0 Vote(s) - 0 Average
  • 1
  • 2
  • 3
  • 4
  • 5
Share Post: Reddit Facebook
Abode IoT Security Camera Vulnerabilities Bitdefender
#1
https://www.bitdefender.com/blog/hotfors...der-finds/    Smart Home
2 min read
Abode IoT Security Camera Vulnerabilities Would Let Attackers Insert Images, Bitdefender Finds
Silviu STAHIE

December 21, 2021
Bitdefender's security researchers have identified several vulnerabilities in the Abode IOTA Smart Camera that would permit attackers to inject their own media into the timeline, obtain the devices' geographical location, and more.

It's difficult to argue against the usefulness of security cameras, but customers have to be aware they also introduce a bullseye into their smart home. The IoT ecosystem is chock full of vulnerable devices, and criminals have slowly shifted their interests towards this ever-growing industry. More and more people buy IoT devices but don't always protect them, keep them up to date or even bother to check if the manufacturer still provides support.

Smart security cameras are all the more dangerous because they offer unique insight into people's lives when compromised. They're also prime targets for attackers looking for vulnerable IoT devices.
Hardcoding credentials is a no-no

The Abode IOTA Smart Camera uses the XMPP protocol with authentication to communicate with the cloud, which in itself is unusual. XMPP is rarely used for this, and the reason the manufacturer chose this protocol is unclear.

"To configure them from a blank state, the devices connect to the setup.goabode.com XMPP service to receive the configuration parameters," say the Bitdefender researchers. "Those parameters include the XMPP credentials to use after configuration."

"The XMPP credentials are the MAC address of the device (that forms the username) and a random password. However, because the device does not know this password before it's configured, to connect to the setup server it uses a hardcoded one."

Furthermore, while the XMPP connection uses TLS (encryption), the device doesn't check the validity of the certificates, which only means that man-in-the-middle attacks are possible, allowing attackers to inject arbitrary commands and take control of the device. The firmware upgrades share the same vulnerability.

Making matters worse, while the image upload process uses HTTPS, the file is uploaded without authentication.

"The reporting ID is then used by the API to identify the account the media belongs to. If an attacker knows the reporting ID, together with the MAC address associated with it, they can upload any media to this API, and it will appear in the timeline of the device," the researchers add. Obtaining the ID is also a trivial matter.
Reply


Possibly Related Threads…
Thread Author Replies Views Last Post
  Vulnerabilities in WatchGuard, Panda Security Products Lead to Code Execution mrtrout 0 478 02-04-2024 , 06:49 AM
Last Post: mrtrout
  Google Uncovers 18 Severe Security Vulnerabilities in Samsung Exynos Chips mrtrout 0 408 03-19-2023 , 06:31 PM
Last Post: mrtrout
  Hacktivists Breach a Security Company, Get Access to 150,000 Camera Feeds mrtrout 0 841 04-01-2021 , 12:09 AM
Last Post: mrtrout
  Adobe Photoshop gets fixes for critical security vulnerabilities tarekma7 0 1,279 07-21-2020 , 09:44 PM
Last Post: tarekma7
  Google Confirms Android Camera Security Threat! sidemoon 0 1,401 11-19-2019 , 10:44 PM
Last Post: sidemoon

Forum Jump:


Users browsing this thread: 1 Guest(s)