• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cyber Security News

Remote Code Execution and Camera Access Flaws Found in Smart Intercoms

You are here: Home / General Cyber Security News / Remote Code Execution and Camera Access Flaws Found in Smart Intercoms
March 13, 2023

A complete of 13 vulnerabilities have been observed in the E11 sensible intercom devices produced by Chinese maker Akuvox, permitting remote code execution (RCE), network entry and extra.

Composing in an advisory published last 7 days, Vera Mens, a security researcher at Claroty’s Group82, mentioned the flaws could be exploited by way of a few different attack vectors: RCE inside of the area region network, distant activation of the device’s digicam and microphone, and via access to an external, insecure FTP server.

The very first of these vectors relies on two flaws connected to lacking authentication for a critical purpose (CVE-2023-0354) and a command injection vulnerability (CVE-2023-0351), respectively. Mens spelled out these bugs could be chained to perform RCE on the community network.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


“If a susceptible device is exposed to the internet, an attacker can use these flaws to take in excess of the device, operate arbitrary code and perhaps move laterally on the enterprise or smaller company network,” she explained.

Locate out far more about authentication here: Authentication Security: Crafting a Bulletproof Password Reset Process

On the other hand, the vulnerability associated to microphone and webcam takeover (CVE-2023-0348) could be leveraged remotely and without the need of authentication. It then authorized for knowledge transfer back to the attacker.

“In privacy-sensitive corporations, these as health care facilities, this can put businesses in violation of quite a few regulations built to be certain affected individual privacy,” Mens additional.

The third attack vector exploited an external and insecure FTP file storage server made up of pictures frequently taken by the intercom through a movement sensor.

“The illustrations or photos are available for durations of time on the server just before they are periodically deleted,” Mens stated. “In this time window, an attacker would be equipped to down load photographs from Akuvox intercoms working anywhere.”

The Claroty security researcher claimed all the flaws keep on being unpatched, even right after Workforce82 contacted Akuvox and shared the disclosure various situations.

“Our attempts to get to Akuvox started in January 2022, and together the way, many guidance tickets were being opened by Crew82 and quickly closed by the seller right before our account was in the end blocked on January 27 2022,” reads the company’s advisory.

The specialized produce-up also incorporates mitigations to limit the security risks of these vulnerabilities. The disclosure arrives months after a security researcher uncovered an iOS Bluetooth bug that permitted applications to eavesdrop on person discussions.


Some components of this short article are sourced from:
www.infosecurity-magazine.com

Previous Post: «Cyber Security News Dark Pink APT Group Deploys KamiKakaBot Against South Asian Entities
Next Post: Fortinet FortiOS Flaw Exploited in Targeted Cyberattacks on Government Entities fortinet fortios flaw exploited in targeted cyberattacks on government entities»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Malicious Python Package Uses Unicode Trickery to Evade Detection and Steal Data
  • Some GitHub users must take action after RSA SSH host key exposed
  • THN Webinar: Inside the High Risk of 3rd-Party SaaS Apps
  • Pension Protection Fund confirms employee data exposed in GoAnywhere breach
  • GitHub Swiftly Replaces Exposed RSA SSH Key to Protect Git Operations
  • Now UK Parliament Bans TikTok from its Network and Devices
  • IRS Phishing Emails Used to Distribute Emotet
  • Researchers Uncover Chinese Nation State Hackers’ Deceptive Attack Strategies
  • Fifth of Execs Admit Security Flaws Cost Them New Biz
  • Online Safety Bill: Why is Ofcom being thrown under the bus?

Copyright © TheCyberSecurity.News, All Rights Reserved.