Vulnerabilities / Threats
4/16/2013
10:46 AM
Connect Directly
RSS
E-Mail
50%
50%

Wireless Camera Flaws Allow Remote Exploitation

Foscam wireless IP cameras contain multiple vulnerabilities that can be used to steal credentials or hack the devices to launch further attacks, warn researchers from Qualys.

Thousands of wireless, Internet-connected cameras manufactured by Foscam have a firmware vulnerability that would allow an attacker to bypass security defenses and remotely steal credentials stored on the device.

That warning was issued Thursday at the Hack In The Box conference in Amsterdam by researchers Sergey Shekyan and Artem Harutyunyan from security firm Qualys. According to the researchers' "To Watch Or To Be Watched: Turning your surveillance camera against you" presentation -- the Foscam firmware vulnerability allows an attacker to dump the entire memory, with no credentials, from the IP cameras. That memory dump would reveal, in plain text, the username and password for accessing the device, as well as any stored credentials for authenticating to Wi-Fi routers, websites, email accounts or FTP sites.

The unauthenticated attacker can access to the entire filesystem and steal Web & Wi-Fi credentials, according to a bug report posted to Neohapis. Attackers would also have access to whatever video and audio was being recorded by the camera.

[ Lawmakers who think legislation can thwart hackers who target financial institutions don't understand how the attacks work. Read Laws Can't Save Banks From DDoS Attacks. ]

According to a related vulnerability report released by the Department of Homeland Security on March 15, the Foscam IP cameras -- prior to firmware version 11.37.2.49 -- contain a directory traversal vulnerability in their Web interface that "allows remote attackers to read arbitrary files via a .. [dot dot] in the URI," referring to a uniform resource indicator such as "http."

The vulnerable cameras are manufactured by Hong Kong-based Foscam Electronics. While Foscam has released updated firmware that patches the directory traversal vulnerability, 99% of Internet-connected wireless Foscam IP cameras are still using the old firmware, according to the Qualys researchers.

Furthermore, the directory traversal flaw wasn't the only way of exploiting wireless Foscam cameras, they said. For example, a query using the Shodan search engine -- which will reveal Internet-connected devices with embedded Web servers -- revealed about 100,000 Internet-connected Foscam cameras, including 16,000 in the United States. On average, 20% of all Foscam cameras the researchers studied were configured to allow for a remote login using a username of "admin" and no password.

Even when devices do have a password, they remain vulnerable to brute-force login attacks. The researchers said that that free tools such as THC-Hydra, described as a "very fast network logon cracker," would make short work of Foscam cameras sporting default credentials or weak passwords.

Foscam cameras are also vulnerable to a cross-site request forgery (CSRF) attack, in which a malicious link -- sent via email -- could be used to add an additional administrator account to a targeted device.

Beyond gaining access to the devices and compromising stored credentials, attackers could rewrite the code running on the devices, which run the Linux-based operating system uClinux, to make them proxies for launching malware or distributed-denial-of-service attacks against local or external networks, the Qualys researchers warned.

According to the researchers' presentation, the best way to secure the wireless Foscam cameras is to not expose the camera to [the] outside network. If that can't be done, they recommend using firewall or intrusion prevention system rules to limit connections to the devices to a list of authorized IP addresses, as well as throttling bandwidth rates for anything that connects to the devices to slow any brute-force password-guessing attack. Finally, they recommend overriding any response headers issued by the device, which would make them harder to identify using Shodan and other Web-server-search tools.

People are your most vulnerable endpoint. Make sure your security strategy addresses that fact. Also in the new, all-digital How Hackers Fool Your Employees issue of Dark Reading: Effective security doesn't mean stopping all attackers. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
CasualGazer
50%
50%
CasualGazer,
User Rank: Apprentice
6/28/2013 | 10:06:08 PM
re: Wireless Camera Flaws Allow Remote Exploitation
The best way to secure the camera is to use a VPN, which is very easy to set up and configure. This way, you have a secure, encrypted connection to any device in your house, without having to worry about the security of its onboard software.

Never trust web servers on cameras, printers, or anything else. So many of them contain vulnerabilities that can't be mitigated by firewall settings. VPN is the way to go.
Computer Repair Whiteplains NY
50%
50%
Computer Repair Whiteplains NY,
User Rank: Apprentice
4/16/2013 | 7:47:14 PM
re: Wireless Camera Flaws Allow Remote Exploitation
I agree: the best way to secure the camera is to have it firewalled and with rules. In addition, if the router or firewall has the bandwidth shaping feature, it will block awkward request from pinging devices.
Register for Dark Reading Newsletters
Partner Perspectives
What's This?
In a digital world inundated with advanced security threats, Intel Security seeks to transform how we live and work to keep our information secure. Through hardware and software development, Intel Security delivers robust solutions that integrate security into every layer of every digital device. In combining the security expertise of McAfee with the innovation, performance, and trust of Intel, this vision becomes a reality.

As we rely on technology to enhance our everyday and business life, we must too consider the security of the intellectual property and confidential data that is housed on these devices. As we increase the number of devices we use, we increase the number of gateways and opportunity for security threats. Intel Security takes the “security connected” approach to ensure that every device is secure, and that all security solutions are seamlessly integrated.
Featured Writers
White Papers
Cartoon
Current Issue
Dark Reading's October Tech Digest
Fast data analysis can stymie attacks and strengthen enterprise security. Does your team have the data smarts?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-5242
Published: 2014-10-21
Directory traversal vulnerability in functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the name parameter in a get_template action.

CVE-2012-5243
Published: 2014-10-21
functions/suggest.php in Banana Dance B.2.6 and earlier allows remote attackers to read arbitrary database information via a crafted request.

CVE-2012-5702
Published: 2014-10-21
Multiple cross-site scripting (XSS) vulnerabilities in dotProject before 2.1.7 allow remote attackers to inject arbitrary web script or HTML via the (1) callback parameter in a color_selector action, (2) field parameter in a date_format action, or (3) company_name parameter in an addedit action to i...

CVE-2013-7406
Published: 2014-10-21
SQL injection vulnerability in the MRBS module for Drupal allows remote attackers to execute arbitrary SQL commands via unspecified vectors.

CVE-2014-2531
Published: 2014-10-21
SQL injection vulnerability in xhr.php in InterWorx Web Control Panel (aka InterWorx Hosting Control Panel and InterWorx-CP) before 5.0.14 build 577 allows remote authenticated users to execute arbitrary SQL commands via the i parameter in a search action to the (1) NodeWorx , (2) SiteWorx, or (3) R...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Follow Dark Reading editors into the field as they talk with noted experts from the security world.