EZVIZ video cameras can be accessed remotely

By

Full device takeover possible.

Researchers at security vendor Bitdefender have found a series of serious vulnerabilities which could be used to remotely control EZVIZ networked cameras without authentication, in order to download and decrypt images.

EZVIZ video cameras can be accessed remotely
Source: Bitdefender

Bitdefender was able to create an attack chain of four different bugs to take over the EZVIZ cameras, exploiting a stack buffer overflow, and vulnerable application programming interface endpoints.

Together, the attack chain would lead to full camera takeover with video feed access.

Bitdefender was also able capture the encryption key for images and recover the administrator password.

The cameras are sold and used in Australia and New Zealand.

Camera firmware version 5.3.0 build 201719 was found to contain the vulnerabilities, but Bitdefender said earlier versions could also be vulnerable [pdf].

EZVIZ has issued patches for the affected cameras.

Internet connected cameras have been under attack the past few years.

The Mirai botnet, which was behind some of the largest distributed denial of service attacks was traced back to insecure cameras made by Hangzhou Xiongmai technologies.

Last year, cameras made by Verkada and used by a Tesla supplier and hundreds of other businesses were breached by Swiss hacktivist Tillie Kottman, exposing footage from some 150,000 devices.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Macquarie Uni to spend up to $700m on 10-year digital transformation

Macquarie Uni to spend up to $700m on 10-year digital transformation

Nissan A/NZ's outsourced cyber incident call centre breached

Nissan A/NZ's outsourced cyber incident call centre breached

Digital ID bill passes parliament

Digital ID bill passes parliament

Macquarie's banking CISO headed to Endeavour Group

Macquarie's banking CISO headed to Endeavour Group

Log In

  |  Forgot your password?