Baby Monitors Expose Home -- And Business -- Networks

  /     /     /  
Publicated : 22/11/2024   Category : security


Baby Monitors Expose Home -- And Business -- Networks


Researchers find major security flaws in popular networked video baby monitor products that could allow attackers to snoop on babies and businesses.



Rapid7 researchers discovered ten gaping security holes in eight different networked video baby monitors that they say could expose not only a familys privacy but ultimately the security of businesses with home workers. The flawed baby monitors represent a microcosm of inherent insecure features that come with Internet of Things (IoT) devices of all sizes, the researchers say.
A lot of the same [security] issues are in business-focused IoT, says Mark Stanislav, senior security consultant at Rapid7, who spearheaded the new research. Seemingly benign networked devices such as nursery monitors could be used as a stepping-stone to other home network devices, namely a home workers business data and applications, he says.
Why hack baby monitors? Its a safety device that seems innocuous and friendly, Stanislav says, but in reality carries some classic IoT vulnerabilities that could all too easily be exploited.  
Like most consumer home IoT devices, baby monitors are basically black boxes shipped and built without security. The devices include cameras that can be commandeered to scan the entire home network, for example, he says. Its the same risk of any IoT device in your home being used as a stepping-stone to your office network and data, he says.
Stanislav studied networked baby monitors from six vendors, ranging in price from $55 to $260. I really wanted to figure out if cameras of a higher price [range] were more secure or less secure, he says. The devices are vulnerable to remote attacks if theyre connected to a WiFi network; otherwise, they can only be hacked via a physical attack.
Its not the first time baby monitors have been hacked by researchers, but it is the first time a wide range of them has been studied and tested closely for their security bugs and risks of compromise, he says.
Stanislav in his research found hardcoded backdoor credentials (think admin and admin) in five of the devices, a privilege escalation bug in one, an authentication bypass flaw in another, an information leakage flaw in another, a direct browsing flaw in another, and a reflective, stored cross-site scripting (XSS) bug in another model.
Rapid7 so far hasnt seen signs of any widespread home IoT attack campaigns, and none of the baby monitor bugs had been fixed as of this posting. But the researchers say their report should serve as a warning of the growing risk businesses face as their employees accumulate more of these interconnected home devices and the lines blur between home and business networks.
The Philips Electronics audio/video In.Sight Wireless HD Baby Monitor B120E/37 accounted for three of the vulnerabilities Rapid7 found:  hardcoded credentials that could be used to access the local Web server and the operating system of the device; reflective and stored XSS in the cloud-based Web service used to stream video; and a flaw in the remote viewing feature that could allow an unauthorized person to see video feeds generated by the baby monitor.
Its exposing the entire camera Web app server on the Net, Stanislav says of the bugs. If you connect to the device and youre not the person who initiated the connection and is authorized to view it, you shouldnt be allowed to view it, he says. The vuln is [that its] not requiring any authentication, he says.
Philips says it no longer manufactures the monitor and has licensed it to Gibson Innovations, which distributes the product under the Philips brand name. Gibson Innovations is aware of the identified security vulnerabilities, and has been developing and implementing software updates for the affected discontinued version of the product. The software update is expected to be available to the general public by the first week of September 2015, a Philips spokesperson said in a statement provided to
Dark Reading
.
Philips and Gibson Innovations are committed to ensuring the security and integrity of our products, the statement said. Whilst the security vulnerabilities are a concern and are being addressed, at this time we are not aware of any consumers who have been directly affected by this issue.
Other baby monitors found with flaws: The iBaby Labs iBaby M6 and iBaby M3S monitors; Summer Infant Zoom Baby WiFi & Internet Viewing System; Lens Laboratories Lens Peek-A-View; Gynoiis Gynoii; and TRENDnet WiFi BabyCam TV-IP743SIC. 
The iBaby M3Ss hardcoded credentials are admin for the login, and admin as the password. Stanislav also found what he describes as a critical flaw in the playback video feature of the iBaby monitors. The actual [web] page showing file names is not protected for the individual camera owner, he says. It shows the file names on the public site. So as long as you know a file name, you can now download the video. It [also] lets one person with any account write a script to download every video from other [customers] camera recordings. There is no authentication.
Stanislav today will present his findings at the
High Technology Crime Investigation Association conference
in Orlando, Fla. 

Last News

▸ Hack Your Hotel Room ◂
Discovered: 23/12/2024
Category: security

▸ Website hacks happened during World Cup final. ◂
Discovered: 23/12/2024
Category: security

▸ Criminal Possession of Government-Grade Stealth Malware ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Baby Monitors Expose Home -- And Business -- Networks