Hackers Can Exploit This Bug to Tamper with Surveillance Camera Footage

2018-11-29T16:00:28+00:00December 3rd, 2018|Tags: , , |

There is a vulnerability in Nuuo surveillance cameras which hackers can use to hijack the devices to tamper with footage and live feeds.

The Cybersecurity firm Digital Defense said that its Vulnerability Research Team (VRT) had uncovered a zero-day vulnerability in Nuuo NVRmini 2 Network Video Recorder firmware, software used by hundreds of thousands of surveillance cameras worldwide.

The vulnerability is an unauthenticated remote buffer overflow security flaw which can be exploited by attackers execute arbitrary code on the system with root privileges. Not only could threat actors harness the bug to access and modify camera feeds & recordings, but also to change the configuration and settings of cameras.

In order to exploit the vulnerability, attackers can send a crafted GET request to a service which is using the vulnerable firmware. As long as there is a URI length of 351 or greater included in the packet, this will trigger the stack overflow.

“Overflowing of the stack variable, which is intended to hold the request data, results in the overwriting of stored return addresses, and with a properly crafted payload, can be leveraged to achieve arbitrary code execution,” Digital Defense says.

The source of the problem lies in a failure to properly sanitize user-supplied inputs, combined with a lack of URI length checks.

NVRmini 2 firmware version 3.9.1 and prior is vulnerable to exploit. Nuuo responded quickly to the researcher’s disclosure and has released a patch which resolves the issue. The patch can be downloaded here.

Back in September, researchers from Tenable revealed a remote code execution flaw in Nuuo cameras. This vulnerability, nicknamed Peekaboo, also permitted attackers to tamper with camera footage.

 

Source: ZDNet