Wireless Camera Allows Remote Attacks

Monday, January 27, 2014 @ 03:01 PM gHale

Foscam released firmware updates for its wireless IP cameras that contain multiple vulnerabilities an attacker could use to steal credentials or hack the devices to launch further attacks.

Foscam’s firmware updates are for the FR WIFI module, namely FI8910W, FI8918W, FI8916W, FI8910E, FI8904W, FI8905W, FI8906W, FI8905E, and FI8919W.

RELATED STORIES
Working a Smartphone Against Itself
Bugs in Cisco TelePresence Systems
Remote Spying via Network Video Recorders
BlackBerry Fixes Vulnerabilities

The vulnerability affects thousands of wireless, Internet-connected cameras that could allow an attacker to bypass security defenses and remotely steal credentials stored on the device.

The initial warning came Thursday at the Hack In The Box conference in Amsterdam by researchers Sergey Shekyan and Artem Harutyunyan from security firm Qualys. The researchers said the Foscam firmware vulnerability allows an attacker to dump the entire memory, with no credentials, from the IP cameras. That memory dump would reveal, in plain text, the username and password for accessing the device, as well as any stored credentials for authenticating to Wi-Fi routers, websites, email accounts or FTP sites.

The unauthenticated attacker can access the entire filesystem and steal Web & Wi-Fi credentials, according to a report posted to Neohapis. Attackers would also have access to whatever video and audio the camera recorded.

According to the researchers’ presentation, the best way to secure the wireless Foscam cameras is to not expose the camera to [the] outside network. If that can’t be done, they recommend using firewall or intrusion prevention system rules to limit connections to the devices to a list of authorized IP addresses, as well as throttling bandwidth rates for anything that connects to the devices to slow any brute-force password-guessing attack. Finally, they recommend overriding any response headers issued by the device, which would make them harder to identify using Shodan and other Web-server-search tools.



Leave a Reply

You must be logged in to post a comment.