Backdoor Accounts Found in 80 Sony IP Security Camera Models (pcworld.com) 55
Many network security cameras made by Sony could be taken over by hackers and infected with botnet malware if their firmware is not updated to the latest version. Researchers from SEC Consult have found two backdoor accounts that exist in 80 models of professional Sony security cameras, mainly used by companies and government agencies given their high price, PCWorld reports. From the article: One set of hard-coded credentials is in the Web interface and allows a remote attacker to send requests that would enable the Telnet service on the camera, the SEC Consult researchers said in an advisory Tuesday. The second hard-coded password is for the root account that could be used to take full control of the camera over Telnet. The researchers established that the password is static based on its cryptographic hash and, while they haven't actually cracked it, they believe it's only a matter of time until someone does. Sony released a patch to the affected camera models last week.
Oh boy! (Score:1)
Lorex security cameras just as bad max password (Score:2)
Lorex security cameras just as bad max password is 6 characters
Re: (Score:1)
As recently as 2013, the American Express website would only look at and store the first 8 characters you typed in. If you thought your password was "morningsAreFun123_whenYouGetWood456", it was really just "mornings", and ridiculously easy to crack. There used to be threads all over community.americanexpress.com bitching about it. Ironically, the forum site itself required a more complex password than the strongest one you were allowed to create on your actual banking/card account!!
Never made any sense to
Re: (Score:2)
Re:Lorex security cameras just as bad max password (Score:4, Interesting)
Most of those platforms run on systems with limited memory. 200 bytes for 5 usernames and their passwords is 'a lot' of storage if you only have 128kbytes of it.
Re: (Score:1)
1988 just called - they want their hardware back...
Re: (Score:2)
How do you think we "IoT" device makers are making money on 'free' devices or '$10/month unlimited storage'. It's not because we have a 2GHz processor in every device, these are the specs on the 'latest' "Smart WiFi/BT application SoC": 256KB embedded Flash and 32KB SRAM. Often these devices are made with yesteryear's chips that are half or even quarter of that.
And in that 256KB must fit: 2-4 web pages with graphics, the various triggers, motion code (send a picture to SMTP, FTP, SMB)
Re:Of course (Score:4, Insightful)
Whether or not you personally use Sony products does not prohibit someone else from taking your ISP offline with a botnet of Sony products.
Re: (Score:2)
No, but it would be nice if the makers of crappy hardware were responsible for the damage done by their faulty products. Let's call this novel, revolutionary idea "product liability".
What camera to buy? (Score:4, Insightful)
I'd like to buy an IP camera, but I haven't been able to find any that are as open/secure/clearly* supported than a raspberry pi with a camera board (and motion software). I'd rather buy a complete solution than put it together myself though.
Requirements:
* Not require the cloud. (Happy if the feature exists as long as it has an off switch)
* Have an OS that has a stated support period (of at least 3 years)
* Sent a video feed to other device on my network.
* 720p+
* Ideal budge Less than $100
Ideally it would have an Open Source OS that I can replace if I want, but does everything I need so I never want to...
Re: (Score:2)
No idea but i'd like some of those too.
Openipcam.com local lan only, plenty of choices (Score:2)
The first result in my Google search for "open ip camera firmware" looked pretty promising, so I'm guessing you have another requirement that none of those cameras meet? Using the open firmware DOES mean upgrading from the factory firmware, is that a major issue?
> Sent a video feed to other device on my network.
If your firewall or vlan restricts it to your local network only, how important is future firmware support? If it works today, with a standard/open protocol such as mpeg, and it's not connecte
Re: (Score:2)
>Using the open firmware DOES mean upgrading from the factory firmware, is that a major issue?
I did review openipcam.com before asking, but yes, I would prefer if the camera vendor was actually involved.
>If your firewall or vlan restricts it to your local network only, how important is future firmware support? If it works today, with a standard/open protocol such as mpeg, and it's not connected to the internet, what future upgrades can be so important?
Good point. In the simple case this would just me
On Linksys, click Access Policy (Score:2)
Without VLANs, you list devices are not allowed to access the internet. On Linksys, it's called Access Policy.
http://www.linksys.com/ph/supp... [linksys.com]
Netgear probably has the same capability.
Re: (Score:3)
Check out the UBNT UniFi cameras. They can work standalone, but work much better when you connect them to their DVR software (which runs on Java, so works on Linux, Windows, OS X ,etc). Better yet, all you use to view and configure it is... a web browser.
So the camera
Re: (Score:2)
You're not going to find a 'good' IP camera sub-$100. Axis makes (or at least made a few years ago) some awesome devices running Linux, publishing sources etc. Some Netgear is good too although video quality is bad and getting sources is also horrendous. Other than that, I haven't seen anything 'good' recently unless you go old school analog and use a DVR.
Re: (Score:2)
1. put $camera on seaprate vlan
2. don't route to/from it from the interwebs
3. stop caring about OS support period
4. ???
5. video feeds!
literally the only requirement is that it, as you say, does not *require* "the cloud". but i guess most cameras can operate more or less on their own. (?)
Re: (Score:2)
Ditto. Also, wireless.
Comment removed (Score:4, Interesting)
Re: (Score:2)
It was likely left there on purpose.
Not just Sony (Score:3, Informative)
Lots of the big name security brands are running the same basic NetSurveillance WEB firmware underneath their skinned interface. I'm thinking particularly of the brand that makes flight data recorders... and cordless doorbells. I wonder if people would pay serious money for a IPTV network if they knew it's just a re-badged Mirai host.
How do I know? They hit me 24/7, I'll be worried about the connectivity of the internet if they ever stop.
80 models? (Score:2)
Re: (Score:2)
A "patch"... as if they are fixing something (Score:1)
[quote]Sony released a patch to the affected camera models last week.[/quote]
Don't buy it. As far as Sony was concerned, this was a "feature" they agreed to put in the camera to allow access by state actors. The feature only become a security bug once the public found out about the program.
The company that rootkitted Windows from audio CDs (Score:5, Insightful)
So the company that put Windows rootkits on Redbook audio CDs puts backdoors in other products? Stunning!
The company that sold the PSP 1000 to early adopters at $250+ per unit based on all the things it would be able to do with expansions, then released expansions that only worked with later models doesn't take their customers' needs seriously? Shocking!
The company that advertised Linux on the PlayStation 3 then made it impossible to use Linux if you installed most of the newer PS/3 games stomps on their promises? Inconceivable!
Or... oh, wait... no, that's not it. The surprising part is that anybody trusts these shady jerks at all.
Not cracked (Score:4, Interesting)
So they have an MD5 hash, but don't know what value hashes to it. They have no idea if it's a 10 character '1234567890' password or a 64 character string of random bytes. They also know that it's not a string that Google has already found and cached. The only clue they have to go on is the existing backdoor they found that turns telnet on, which uses 11 random ASCII characters as the secret. But 11 characters are almost out of reach for brute force password testing. If the person who put the backdoor in applied only the same amount of thought to the secret password, that would still be a monster to attack with brute force.
So I disagree that it's a matter of time. I think it's a matter of defeating it in another way, such as having Wireshark running when someone who actually knows the password types it in; or uncovering a wikileaked document that contains the secret backdoor password.
Re: (Score:1)
Re: (Score:2)
Telnet? (Score:2)
I wish (Score:2)
I wish I could say "I'm shocked!", but I can't because I'm not.
Where is the problem? (Score:2)
Nobody who has at least a passing interest in security buys Sony products anymore, and everyone else very obviously doesn't care about security.