TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Zero-Day Bug Allows Hackers to Access CCTV Surveillance Cameras

76 pointsby arayhover 6 years ago

14 comments

ianlevesqueover 6 years ago
Calling the second one a bug is ridiculous. “If the file /tmp/moses/ exists on the file system then an unauthenticated remote attacker can list all of the non-admin users and change their passwords“. That functionality is way too intentional.
评论 #18020406 未加载
dralleyover 6 years ago
Ah, security cameras. Never-updated linux boxes, frequently with homegrown http servers, often with secret hardcoded credentials in clear text laying around in the firmware blob.<p><a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=B8DjTcANBx0" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=B8DjTcANBx0</a>
yongjikover 6 years ago
Somewhat off-topic:<p>Recently I watched a news segment in Korea about CCTVs connected to the internet without proper security: so many were wide open, and some could even record sound and play it real-time, and their lists were plainly accessible on some websites. The reporter said that the government had responded by <i>blocking these websites from the Korean internet</i> but people still found ways to access them via VPN.<p>As if that&#x27;s the crux of the problem.<p>The mind boggles.
评论 #18018882 未加载
pmlnrover 6 years ago
Doesn&#x27;t CCTV stand for close circuit television? It shouldn&#x27;t be applied when these are rather obviously not closed at all.
评论 #18023603 未加载
classichasclassover 6 years ago
My house security and automation systems are all behind a firewall and access to them is proxied, including the video feed concentrator for the security cameras. I&#x27;ve had folks call this overkill but I won&#x27;t directly expose any IoT-like thing to the Internet these days.
评论 #18020871 未加载
评论 #18019422 未加载
评论 #18019150 未加载
评论 #18020733 未加载
评论 #18020773 未加载
moftzover 6 years ago
“It’s unfortunate, but each camera will need to be updated manually by users,”<p>So most people aren&#x27;t going to bother unless they get an alarming email from the manufacturer (assuming they even have a list of customer email addresses). Although these appear to be DVR systems for commercial use so it&#x27;s more likely that a business would have a service contract with someone to manage these things. The service vendor would probably be more inclined to patch the thing than the business owner would.
teddyhover 6 years ago
Any Internet-connected device is, in fact, a server, and must be seen and managed as one. This means strict control of installed services and, first and foremost, regular <i>updates</i> of all its software components (including firmware). If you acquire and install such a server which either can’t be updated or one which you know, realistically, won’t get any updates six months after installation, that’s asking to lose.
评论 #18020091 未加载
exikyutover 6 years ago
I look at mainstream security devices.<p>I look at cheap camera modules and Linux boards.<p>I look some more at the mainstream security devices.<p>I look again at the cheap cameras and Linux boards.<p>Sadly, security cameras are among the most hackable targets on the Internet, because You™ haven&#x27;t released that competitive solution you&#x27;ve been thinking about that prioritizes security over unnecessary bells and whistles. When you do, you&#x27;ll corner that vocal fraction of the community you&#x27;ve always been wanting to meet.<p>It doesn&#x27;t have to be a bureaucratic, incoherent, legacy-burdened headache built from clipboard-remixed vendor samples. Linux, no blobs, a couple lightweight services; and you&#x27;re done. Remote access in the palm of your hand? Too easy. Anything is possible when you design without agendas.<p>--<p>Your plaintext passwords (which were also using in two other places - argh) just leaked from a vendor&#x27;s stolen cloud database.<p>A HTTP URL hack that dumps the root password into the browser window surfaced seven months ago.
janciover 6 years ago
Having a CCTV on public IPs is calling for trouble.
m-p-3over 6 years ago
Seriously folks... put all those cameras behind firewalls, and only grant access to them over a VPN.
评论 #18018999 未加载
评论 #18019899 未加载
评论 #18018905 未加载
fixermarkover 6 years ago
As opposed to all other days, where simple misconfiguration allows hackers to access CCTV surveillance cameras.<p>(obligatory <a href="https:&#x2F;&#x2F;www.shodan.io&#x2F;" rel="nofollow">https:&#x2F;&#x2F;www.shodan.io&#x2F;</a> link ;) )
qrbLPHiKpiuxover 6 years ago
They were all open via Shodan years ago.
mavhcover 6 years ago
Is there anyone selling CCTV cameras with good software?
评论 #18019956 未加载
kakarotover 6 years ago
Come on, who hasn&#x27;t penetrated a poorly-guarded CCTV system in their time? That&#x27;s like hacker 101