{"id":12563,"date":"2016-12-13T10:00:35","date_gmt":"2016-12-13T16:00:35","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=12563"},"modified":"2020-09-08T10:31:14","modified_gmt":"2020-09-08T15:31:14","slug":"backdoor-discovered-sony-ipela-engine-cameras","status":"publish","type":"post","link":"https:\/\/www.een.com\/it\/blog\/backdoor-discovered-sony-ipela-engine-cameras\/","title":{"rendered":"Sony IP Cameras"},"content":{"rendered":"<h3>Vulnerability affects over 80 different camera models<\/h3>\n<p>Today some associates at Sec Consult found 2 different back doors in SONY IP Cameras. Sony<br \/>\nhas responded, but be sure to update your firmware on all your cameras immediately. This is<br \/>\na severe vulnerability that can lead to takeover of the camera and then access to your network.<\/p>\n<p>&#8220;SEC Consult has found a backdoor in Sony IPELA Engine IP Cameras, mainly used professionally by enterprises and authorities. This backdoor allows an attacker to run arbitrary code on the affected IP cameras. An attacker can use cameras to take a foothold in a network and launch further attacks, disrupt camera functionality, send manipulated images\/video, add cameras into a Mirai-like botnet or to just simply spy on you. This vulnerability affects 80 different Sony camera models. Sony was informed by SEC Consult about the vulnerability and has since released updated firmware for the affected models\u201d<\/p>\n<p><img decoding=\"async\" class=\"alignnone size-full wp-image-12564\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/SEC-Consult-Logo.jpg\" alt=\"sec-consult-logo\" width=\"291\" height=\"94\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/SEC-Consult-Logo.jpg 291w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/SEC-Consult-Logo-100x32.jpg 100w, https:\/\/www.een.com\/wp-content\/uploads\/2016\/12\/SEC-Consult-Logo-200x65.jpg 200w\" sizes=\"(max-width: 291px) 100vw, 291px\" \/><\/p>\n<p>Detailed info:<\/p>\n<p><a href=\"http:\/\/blog.sec-consult.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> http:\/\/blog.sec-consult.com\/<\/a><br \/>\n<a href=\"https:\/\/www.sec-consult.com\/fxdata\/seccons\/prod\/temedia\/advisories_txt\/20161206-0_Sony_IPELA_Engine_IP_Cameras_Backdoors_v10.txt\" target=\"_blank\" rel=\"noopener noreferrer\"> https:\/\/www.sec-consult.com\/fxdata\/seccons\/prod\/temedia\/advisories_txt\/20161206-0_Sony_IPELA_Engine_IP_Cameras_Backdoors_v10.txt<\/a><br \/>\n<a href=\"https:\/\/krebsonsecurity.com\/2016\/12\/researchers-find-fresh-fodder-for-iot-attack-cannons\/\" target=\"_blank\" rel=\"noopener noreferrer\"> https:\/\/krebsonsecurity.com\/2016\/12\/researchers-find-fresh-fodder-for-iot-attack-cannons\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Vulnerability affects over 80 different camera models Today some associates at Sec Consult found 2 different back doors in SONY IP Cameras. Sony has responded, but be sure to update &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/it\/blog\/backdoor-discovered-sony-ipela-engine-cameras\/\"> <span class=\"screen-reader-text\">Sony IP Cameras<\/span> Leggi altro &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":13212,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1282,1272],"class_list":["post-12563","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-ip-cameras","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/posts\/12563","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/comments?post=12563"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/posts\/12563\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/media\/13212"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/media?parent=12563"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/categories?post=12563"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/it\/wp-json\/wp\/v2\/tags?post=12563"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}