Vulnerabilities / Threats
10:46 AM

Wireless Camera Flaws Allow Remote Exploitation

Foscam wireless IP cameras contain multiple vulnerabilities that can be used to steal credentials or hack the devices to launch further attacks, warn researchers from Qualys.

Thousands of wireless, Internet-connected cameras manufactured by Foscam have a firmware vulnerability that would allow an attacker to bypass security defenses and remotely steal credentials stored on the device.

That warning was issued Thursday at the Hack In The Box conference in Amsterdam by researchers Sergey Shekyan and Artem Harutyunyan from security firm Qualys. According to the researchers' "To Watch Or To Be Watched: Turning your surveillance camera against you" presentation -- the Foscam firmware vulnerability allows an attacker to dump the entire memory, with no credentials, from the IP cameras. That memory dump would reveal, in plain text, the username and password for accessing the device, as well as any stored credentials for authenticating to Wi-Fi routers, websites, email accounts or FTP sites.

The unauthenticated attacker can access to the entire filesystem and steal Web & Wi-Fi credentials, according to a bug report posted to Neohapis. Attackers would also have access to whatever video and audio was being recorded by the camera.

[ Lawmakers who think legislation can thwart hackers who target financial institutions don't understand how the attacks work. Read Laws Can't Save Banks From DDoS Attacks. ]

According to a related vulnerability report released by the Department of Homeland Security on March 15, the Foscam IP cameras -- prior to firmware version -- contain a directory traversal vulnerability in their Web interface that "allows remote attackers to read arbitrary files via a .. [dot dot] in the URI," referring to a uniform resource indicator such as "http."

The vulnerable cameras are manufactured by Hong Kong-based Foscam Electronics. While Foscam has released updated firmware that patches the directory traversal vulnerability, 99% of Internet-connected wireless Foscam IP cameras are still using the old firmware, according to the Qualys researchers.

Furthermore, the directory traversal flaw wasn't the only way of exploiting wireless Foscam cameras, they said. For example, a query using the Shodan search engine -- which will reveal Internet-connected devices with embedded Web servers -- revealed about 100,000 Internet-connected Foscam cameras, including 16,000 in the United States. On average, 20% of all Foscam cameras the researchers studied were configured to allow for a remote login using a username of "admin" and no password.

Even when devices do have a password, they remain vulnerable to brute-force login attacks. The researchers said that that free tools such as THC-Hydra, described as a "very fast network logon cracker," would make short work of Foscam cameras sporting default credentials or weak passwords.

Foscam cameras are also vulnerable to a cross-site request forgery (CSRF) attack, in which a malicious link -- sent via email -- could be used to add an additional administrator account to a targeted device.

Beyond gaining access to the devices and compromising stored credentials, attackers could rewrite the code running on the devices, which run the Linux-based operating system uClinux, to make them proxies for launching malware or distributed-denial-of-service attacks against local or external networks, the Qualys researchers warned.

According to the researchers' presentation, the best way to secure the wireless Foscam cameras is to not expose the camera to [the] outside network. If that can't be done, they recommend using firewall or intrusion prevention system rules to limit connections to the devices to a list of authorized IP addresses, as well as throttling bandwidth rates for anything that connects to the devices to slow any brute-force password-guessing attack. Finally, they recommend overriding any response headers issued by the device, which would make them harder to identify using Shodan and other Web-server-search tools.

People are your most vulnerable endpoint. Make sure your security strategy addresses that fact. Also in the new, all-digital How Hackers Fool Your Employees issue of Dark Reading: Effective security doesn't mean stopping all attackers. (Free registration required.)

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
User Rank: Apprentice
6/28/2013 | 10:06:08 PM
re: Wireless Camera Flaws Allow Remote Exploitation
The best way to secure the camera is to use a VPN, which is very easy to set up and configure. This way, you have a secure, encrypted connection to any device in your house, without having to worry about the security of its onboard software.

Never trust web servers on cameras, printers, or anything else. So many of them contain vulnerabilities that can't be mitigated by firewall settings. VPN is the way to go.
Computer Repair Whiteplains NY
Computer Repair Whiteplains NY,
User Rank: Apprentice
4/16/2013 | 7:47:14 PM
re: Wireless Camera Flaws Allow Remote Exploitation
I agree: the best way to secure the camera is to have it firewalled and with rules. In addition, if the router or firewall has the bandwidth shaping feature, it will block awkward request from pinging devices.
Register for Dark Reading Newsletters
White Papers
Current Issue
Dark Reading Tech Digest September 7, 2015
Some security flaws go beyond simple app vulnerabilities. Have you checked for these?
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
Published: 2015-10-08
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Published: 2015-10-06
libstagefright in Android before 5.1.1 LMY48T allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted media file, aka internal bug 21335999.

Published: 2015-10-06
Bluetooth in Android before 5.1.1 LMY48T allows attackers to remove stored SMS messages via a crafted application, aka internal bug 22343270.

Published: 2015-10-06
mediaserver in Android before 5.1.1 LMY48T allows attackers to cause a denial of service (process crash) via unspecified vectors, aka internal bug 22954006.

Published: 2015-10-06
The Runtime subsystem in Android before 5.1.1 LMY48T allows attackers to gain privileges via a crafted application, as demonstrated by obtaining Signature or SignatureOrSystem access, aka internal bug 23050463.

Dark Reading Radio
Archived Dark Reading Radio
What can the information security industry do to solve the IoT security problem? Learn more and join the conversation on the next episode of Dark Reading Radio.