{"id":13614,"date":"2017-03-14T16:33:02","date_gmt":"2017-03-14T21:33:02","guid":{"rendered":"http:\/\/www.eagleeyenetworks.com\/?p=13614"},"modified":"2020-08-11T14:04:07","modified_gmt":"2020-08-11T19:04:07","slug":"vulnerabilities-wifi-camera-models","status":"publish","type":"post","link":"https:\/\/www.een.com\/nb\/blog\/vulnerabilities-wifi-camera-models\/","title":{"rendered":"Vulnerabilities in WiFi Cameras"},"content":{"rendered":"<p>Inexpensive WiFi cameras are widely available over the internet. That might sound compelling, but it&#8217;s important to understand their security holes and the risk they bring to your network.<\/p>\n<p>Pierre Kim, an IT security blogger, <a href=\"https:\/\/pierrekim.github.io\/blog\/2017-03-08-camera-goahead-0day.html\" target=\"_blank\" rel=\"noopener noreferrer\">has recently discovered<\/a> 1,250 different camera models that are modified and branded by hundreds of companies.<\/p>\n<p>These cameras have many vulnerabilities:<\/p>\n<ul>\n<li>They contain backdoor accounts that will allow the manufacturer full access to your information<\/li>\n<li>They connect to the cloud for the mobile app using clear text passwords<\/li>\n<li>Anyone who has the serial number of the camera can access that camera<\/li>\n<\/ul>\n<p>If you have a camera on this list, Kim recommends immediately\u00a0removing it from the Internet and disposing of it. \u00a0Kim states, &laquo;I advise to IMMEDIATELY DISCONNECT\u00a0cameras to the Internet. Hundreds of thousands of cameras are affected by the 0day Info-Leak. Millions of them are using the insecure Cloud network.&raquo;<\/p>\n<p>Furthermore, Kim implies that the millions of cameras actually include bonnet code already: &laquo;This &laquo;cloud&raquo; protocol seems to be more a botnet\u00a0protocol than a legit remote access protocol and has indeed weakness (everything in clear text, i.e. an attacker can attack cameras within the cloud and leverage potential access to hack internal networks).&raquo;<\/p>\n<p>We recommend\u00a0doing your research before purchasing new cameras \u2013 <strong>don&#8217;t<\/strong>\u00a0buy cheap cameras from unknown manufacturers. Purchasing from a trusted source, even if it&#8217;s more expensive, will benefit you in the long run.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignleft size-full wp-image-13617\" src=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI.jpg\" alt=\"Vulnerabilities-WIFI-Cameras-FI\" width=\"500\" height=\"334\" srcset=\"https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI.jpg 500w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-300x200.jpg 300w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-100x67.jpg 100w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-195x130.jpg 195w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-200x134.jpg 200w, https:\/\/www.een.com\/wp-content\/uploads\/2017\/03\/Vulnerabilities-WIFI-Cameras-FI-400x267.jpg 400w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Inexpensive WiFi cameras are widely available over the internet. That might sound compelling, but it&#8217;s important to understand their security holes and the risk they bring to your network. Pierre &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"\" href=\"https:\/\/www.een.com\/nb\/blog\/vulnerabilities-wifi-camera-models\/\"> <span class=\"screen-reader-text\">Vulnerabilities in WiFi Cameras<\/span> Les mer &raquo;<\/a><\/p>\n","protected":false},"author":3155,"featured_media":13617,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","footnotes":""},"categories":[230],"tags":[1273,1276,1272],"class_list":["post-13614","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security","tag-cloud-video-surveillance","tag-cybersecurity","tag-video-management-software"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts\/13614","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/users\/3155"}],"replies":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/comments?post=13614"}],"version-history":[{"count":0,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/posts\/13614\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/media\/13617"}],"wp:attachment":[{"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/media?parent=13614"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/categories?post=13614"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.een.com\/nb\/wp-json\/wp\/v2\/tags?post=13614"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}