World's largest CCTV maker leaves at least 9 million cameras open to public viewing
Xiongmai's cloud portal opens sneaky backdoor into servers
Yet another IoT device vendor has been found to be exposing their products to attackers with basic security lapses.
This time, it's Chinese surveillance camera maker Xiongmai named and shamed this week by researchers with SEC Consult for the poor security in the XMEye P2P Cloud service. Among the problems researchers pointed to were exposed default credentials and unsigned firmware updates that could be delivered via the service.
As a result, SEC Consult warns, the cameras could be compromised to do everything from spy on their owners, to carry out botnet instructions and even to serve as an entry point for larger network intrusions.
"Our recommendation is to stop using Xiongmai and Xiongmai OEM devices altogether," SEC Consult recommended.
"The company has a bad security track record including its role in Mirai and various other IoT botnets. There are vulnerabilities that have been published in 2017, which are still not fixed in the most recent firmware version."
Enabled by default, the P2P Cloud service allows users to remotely connect to devices via either a web browser or an iOS/Android app and control the hardware without needing a local network connection.
Mirai, Mirai, pwn them all, who's the greatest botnet on the whole?READ MORE
Unfortunately, SEC Consult explained, shortcomings in both the devices themselves and the service, such as unencrypted connections and default passwords (owners are not required to change the defaults when setting up the device) mean that in many cases, accessing and compromising camera could be a cinch.
Additionally, SEC Consult notes, the Xiongmai devices do not require that firmware updates be signed, meaning it would be possible for an attacker to install malware-laden firmware updates to build a botnet or stage further attacks on the local network.
"This is either possible by modifying the filesystems, contained in a firmware update, or modifying the 'InstallDesc' file in a firmware update file," researchers explain.
"The 'InstallDesc' is a text file that contains commands that are executed during the update."
On top of it all, SEC Consult accuses Xiongmai of a pattern of ignoring security warnings and failing to take basic precautions.
The research house claims that not only were its latest warnings to the company ignored, but Xiongmai has a history of bad security going all the way back to its days as fodder for the notorious Mirai botnet. As such, the researchers advise companies stop using any OEM hardware that is based on the Xiongmai hardware. The devices can be identified by their web interface, error page, or product pages advertising the EMEye service. ®
Sponsored: Beyond the Data Frontier