05:15 PM
Connect Directly

Mobile Apps A Vulnerable Spot For Connected Security Cameras

Study finds security camera vendors making the same rookie infosec mistakes that other IoT vendors make.

Internet of Things vendors continue to make rookie mistakes when it comes to security -- even if they're in the business of making people safe. Security cameras that they can be managed remotely with mobile apps are becoming popular with homeowners -- but these mobile apps are prone to fundamental infosec failures that leave the camera feeds open to snooping and manipulation, according to researchers at NowSecure.

The most common failures across the board, were sending and storing sensitive data, including credentials, in plaintext.

"I was shocked and disappointed at the same time to see how easy some of the systems made it for somebody else to access the account," says NowSecure researcher Jake Van Dyke.

Four different vendors -- all chosen for being "popular online choices," according to NowSecure researcher Jake Van Dyke -- were examined in the study, ranging from a one-camera set-up that cost around $100 to multi-camera systems costing thousands of dollars. The Vimtag Fujikam 361 HD camera, coupled with the Vimtag app; the Zmodo PKD-DK4216 model coupled with the Zsight and MeShare apps; the LaView LV-KDV0804B6S paired with the LaView Live app; and the Best Vision Systems SK-DVR-DIY system teamed up with the QMEye were all studied.

Which was worst? In Van Dyke's opinion, it's a toss-up between the Zmodo and Vimtag systems.

The ZSight app used by ZModo played fast and loose with credentials. As Van Dyke wrote, during account registration or login: 

...the app will send your username in plaintext and MD5-hashed password to The Zsight app for iOS sent the username and password as GET parameters meaning the credentials are recoverable from server access logs. Upon successful log in, MeShare's back-end server returns a token for app authentication on subsequent requests. As far as an attacker is concerned, the password, it's MD5 hash, or the token all grant access to the victim's account (i.e., any of these items are equal to a valid login).

It also left username, unencypted passwords, email addresses and valid tokens sitting in XML files. With account access, an attacker could then view the camera's live feed, take pictures, or disassociate the camera with that user's account, and more.

The Vimtag app's key problem was that the app and the back-end server mostly communicate through unencrypted channels, leaving certain activities vulnerable to man-in-the middle threats. Some of those vulnerable activities include, initiating recording of audio or video, accessing stored audio or video, registering a camera to an account, adjusting settings, and formatting an SD card.

Plus, when Van Dyke viewed the app's network settings, the Vimtag back-end server sent over the WPA2 key for the wireless network the camera is connected to and the SSIDs of all  wireless networks in the camera's proximity. "This means," Van Dyke wrote, "an attacker could use SSID to locate a house using the camera, sit on the curb in front, and connect to the network."

"The Zsight application made it easy for somebody to grab the credentials and watch your cameras," says Van Dyke. "The Vimtag system actually leaked enough information for somebody to be able to locate your house and connect your home network."

Of course the IoT world does not have a monopoly on insecure mobile apps. "It is not unique to IoT at all," says Van Dyke. "When we perform app assessments for our customers for a medical or financial-related mobile app, this would get you a report with a big fat red F on the top of it."

Sara Peters is Senior Editor at Dark Reading and formerly the editor-in-chief of Enterprise Efficiency. Prior that she was senior editor for the Computer Security Institute, writing and speaking about virtualization, identity management, cybersecurity law, and a myriad ... View Full Bio

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
Mark Liamey
Mark Liamey,
User Rank: Apprentice
4/14/2016 | 8:05:26 AM
Re: Scary
It's really awful!. When we develop new app, mobile app development company always think about security and safety.
User Rank: Apprentice
2/28/2016 | 4:54:45 AM
scary... specially when you use security cams for your baby or your house....Thanks for this article Sara 
Register for Dark Reading Newsletters
White Papers
Current Issue
5 Security Technologies to Watch in 2017
Emerging tools and services promise to make a difference this year. Are they on your company's list?
Flash Poll
New Best Practices for Secure App Development
New Best Practices for Secure App Development
The transition from DevOps to SecDevOps is combining with the move toward cloud computing to create new challenges - and new opportunities - for the information security team. Download this report, to learn about the new best practices for secure application development.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-15
The Direct Rendering Manager (DRM) subsystem in the Linux kernel through 4.x mishandles requests for Graphics Execution Manager (GEM) objects, which allows context-dependent attackers to cause a denial of service (memory consumption) via an application that processes graphics data, as demonstrated b...

Published: 2015-10-15
netstat in IBM AIX 5.3, 6.1, and 7.1 and VIOS 2.2.x, when a fibre channel adapter is used, allows local users to gain privileges via unspecified vectors.

Published: 2015-10-15
Cross-site request forgery (CSRF) vulnerability in eXtplorer before 2.1.8 allows remote attackers to hijack the authentication of arbitrary users for requests that execute PHP code.

Published: 2015-10-15
Directory traversal vulnerability in QNAP QTS before 4.1.4 build 0910 and 4.2.x before 4.2.0 RC2 build 0910, when AFP is enabled, allows remote attackers to read or write to arbitrary files by leveraging access to an OS X (1) user or (2) guest account.

Published: 2015-10-15
Cisco Application Policy Infrastructure Controller (APIC) 1.1j allows local users to gain privileges via vectors involving addition of an SSH key, aka Bug ID CSCuw46076.

Dark Reading Radio
Archived Dark Reading Radio
In past years, security researchers have discovered ways to hack cars, medical devices, automated teller machines, and many other targets. Dark Reading Executive Editor Kelly Jackson Higgins hosts researcher Samy Kamkar and Levi Gundert, vice president of threat intelligence at Recorded Future, to discuss some of 2016's most unusual and creative hacks by white hats, and what these new vulnerabilities might mean for the coming year.