Header Ads

Hard-coded Passwords Make Hacking Foscam 'IP Cameras' Much Easier

 Hard-coded Passwords Make Hacking Focasm 'IP Cameras' Much Easier


Well, Security researchers discovered vulnerabilities in tens of thousands of Web-Connected cameras










  • Insecure default credentials
  • Hard-coded credentials
  • Hidden and undocumented Telnet functionality
  • Remote Command Injections
  • Incorrect permissions assigned to programming scripts
  • Firewall leaking details about the validity of credentials
  • Persistent cross-site scripting
  • Stack-based Buffer overflow attack

Changing The Default Credentials: It Won't Help You



affected devices

Generally, users are always advised to change default credentials on their smart devices, but in this case, Foscam is using hard-coded credentials in cameras, so the attacker can bypass passwords even if the user has Set a unique Password.




These issues can allow an attacker to have a wide range of attacks, including unauthorized access to the camera, access to private video, display of remote command injection attacks, use compromised IP cameras for DDOS or other malicious activities. And compromising with other devices in the same network .



The security firm told that Foscam was informed about the vulnerability several months ago, but received no response. Since the security camera manufacturer has not fixed any vulnerability, F-Secure has not released proof of concept (POC) for them.

So, what do you think about this? Comment your thoughts below.

No comments:

Powered by Blogger.