Baby Monitors Expose Home -- And Business -- NetworksResearchers find major security flaws in popular networked video baby monitor products that could allow attackers to snoop on babies and businesses.
Rapid7 researchers discovered ten gaping security holes in eight different networked video baby monitors that they say could expose not only a family's privacy but ultimately the security of businesses with home workers. The flawed baby monitors represent a microcosm of inherent insecure features that come with Internet of Things (IoT) devices of all sizes, the researchers say.
"A lot of the same [security] issues are in business-focused IoT," says Mark Stanislav, senior security consultant at Rapid7, who spearheaded the new research. Seemingly benign networked devices such as nursery monitors could be used as a stepping-stone to other home network devices, namely a home worker's business data and applications, he says.
Why hack baby monitors? "It's a safety device that seems innocuous and friendly," Stanislav says, but in reality carries some classic IoT vulnerabilities that could all too easily be exploited.
Like most consumer home IoT devices, baby monitors are basically black boxes shipped and built without security. The devices include cameras that can be commandeered to scan the entire home network, for example, he says. "It's the same risk of any IoT device in your home" being used as a stepping-stone to your office network and data, he says.
Stanislav studied networked baby monitors from six vendors, ranging in price from $55 to $260. "I really wanted to figure out if cameras of a higher price [range] were more secure or less secure," he says. The devices are vulnerable to remote attacks if they're connected to a WiFi network; otherwise, they can only be hacked via a physical attack.
It's not the first time baby monitors have been hacked by researchers, but it is the first time a wide range of them has been studied and tested closely for their security bugs and risks of compromise, he says.
Stanislav in his research found hardcoded backdoor credentials (think "admin" and "admin") in five of the devices, a privilege escalation bug in one, an authentication bypass flaw in another, an information leakage flaw in another, a direct browsing flaw in another, and a reflective, stored cross-site scripting (XSS) bug in another model.
Rapid7 so far hasn't seen signs of any widespread home IoT attack campaigns, and none of the baby monitor bugs had been fixed as of this posting. But the researchers say their report should serve as a warning of the "growing risk businesses face as their employees accumulate more of these interconnected home devices" and the lines "blur" between home and business networks.
The Philips Electronics audio/video In.Sight Wireless HD Baby Monitor B120E/37 accounted for three of the vulnerabilities Rapid7 found: hardcoded credentials that could be used to access the local Web server and the operating system of the device; reflective and stored XSS in the cloud-based Web service used to stream video; and a flaw in the remote viewing feature that could allow an unauthorized person to see video feeds generated by the baby monitor.
"It's exposing the entire camera Web app server on the Net," Stanislav says of the bugs. "If you connect to the device and you're not the person who initiated the connection and is authorized to view it, you shouldn't" be allowed to view it, he says. "The vuln is [that it's] not requiring any authentication," he says.
Philips says it no longer manufactures the monitor and has licensed it to Gibson Innovations, which distributes the product under the Philips brand name. "Gibson Innovations is aware of the identified security vulnerabilities, and has been developing and implementing software updates for the affected discontinued version of the product. The software update is expected to be available to the general public by the first week of September 2015," a Philips spokesperson said in a statement provided to Dark Reading.
"Philips and Gibson Innovations are committed to ensuring the security and integrity of our products," the statement said. "Whilst the security vulnerabilities are a concern and are being addressed, at this time we are not aware of any consumers who have been directly affected by this issue. "
Other baby monitors found with flaws: The iBaby Labs iBaby M6 and iBaby M3S monitors; Summer Infant Zoom Baby WiFi & Internet Viewing System; Lens Laboratories Lens Peek-A-View; Gynoii's Gynoii; and TRENDnet WiFi BabyCam TV-IP743SIC.
The iBaby M3S's hardcoded credentials are "admin" for the login, and "admin" as the password. Stanislav also found what he describes as a "critical" flaw in the playback video feature of the iBaby monitors. "The actual [web] page showing file names is not protected for the individual camera owner," he says. "It shows the file names on the public site. So as long as you know a file name, you can now download the video. It [also] lets one person with any account write a script to download every video from other [customers'] camera recordings. There is no authentication."
Stanislav today will present his findings at the High Technology Crime Investigation Association conference in Orlando, Fla.
Kelly Jackson Higgins is Executive Editor at DarkReading.com. She is an award-winning veteran technology and business journalist with more than two decades of experience in reporting and editing for various publications, including Network Computing, Secure Enterprise ... View Full Bio