IoT security camera vulnerability: Victure PC530

Alexander Vukcevic, 1 month ago 3 min read

Avira researchers have identified a vulnerability in a popular internet of things (IoT) home security camera, the Victure PC530. The vulnerability affects user privacy, allowing cyber-criminals to remotely access camera and view users’ homes.  It also places other home devices at risk of compromise. This article describes the technical issues behind the vulnerability, but if you would like more general information about the challenges created by such devices, you can read more on the avira.com blog.

Technical details of the device and vulnerability

CVE Reference: CVE-2019-15940

Device Name: Wireless Security Camera
Model: PC530
Manufacture: Victure
Firmware Version: 3.13.70
CPU: Grain Media GM81355
Application:iOS & Android
WiFi LAN Frequency:2.4GHz,WPA2 encryption, IEEE802.11b/g/n
SD Card: Max support upto 64G

Researchers at Avira found vulnerabilities in the Victure PC530 surveillance camera that compromise user privacy and cause security risks. They uncovered a security flaw that permits cybercriminals to remotely spy without any form of authentication. This affects the overall security of a home network, and could even impact the global internet infrastructure.

The device is susceptible to a series of authentication bypass vulnerabilities, enabling attackers to remotely gain control of devices, decommission them, or even use them as espionage and surveillance tools.

Vulnerabilities

  • Unauthenticated telnet access with root privileges
  • Intercept password and video stream – RTSP protocol
  • gSOAP service Integer Overflow Vulnerability

Exploitation of the vulnerabilities found in the Victure PC530 surveillance camera, could enable attackers to remotely control a relatively large number of smart cameras. From this, attackers could move laterally across networks and extract sensitive information from other devices on the network. They could potentially extort victims by capturing sensitive and private images and videos from their own homes, or instruct cameras to perform massive denial of service attacks and ask for ransom to stop the assaults.

Unauthenticated telnet access with root privileges

Once telnet is accessed, the system is exposed. The camera then becomes a platform for malicious activities. These can include using the camera to penetrate the network, or the download of tools for spying or running malware.

Avira researchers found that the file system was read-only. However, cameras such as the PC530 typically support external memory cards. Although vendors claim that videos are encrypted and therefore safe from access, an attacker can still install malicious code on the camera using telnet. The camera can then be used for reconnaissance or penetrating other systems on the network. This is demonstrated below:

Using the PC530 for network reconnaissance

Avira researchers ran Nmap on the camera, a free and open source network scanner. The camera scanned the network identifying open services on the network which could then be exploited.

Penetrating and exploiting other systems on the network using the PC530

Researchers found a FTP service on the network that was vulnerable to vsFtpd Backdoor Command Execution. To replicate a real-world scenario, we sent a linux command to a vulnerable system in the network, and received back a response to CnC (the camera):

Intercept password and video stream – RTSP protocol

Researchers observed that the PC530 supported ONVIF software. Although RTSP is not used by default, if ONVIF is used on the camera, it will use RTSP for streaming. Unfortunately, RTSP has weak authentication for credentials, and is vulnerable to man-in-the-middle intercepts of the password and video stream:

A dictionary-based attack was used to extract the username and password of the camera enabling the live video stream to be accessed. Victure has already stated that there is unencrypted traffic when ONVIF is on, which is a security risk.

  • G711ALAW-media-1.wav
  • G711ALAW-media-2.wav
  • H264-media-2.264
  • H264-media-4.264

Avira researchers also found that ONVIF Manager allows the RTSP address to be found and the URL can be played via Media Player without authentication. The RTSP can then be exposed to the internet. This was accomplished as a proof of concept by running TCPdump on the camera and forwarding the RTSP traffic.

gSOAP service integer overflow vulnerability

Further analysis of the camera led to the discovery of the gSOAP Integer Overflow Vulnerability CVE-2017-9765. This allows remote code execution and denial of service. Researchers were successfully able to create a denial of service:

Pid 135 is the process responsible for handling the functionality of the camera. The image below demonstrates it is no longer operating.

A carefully crafted input file (payload) to the camera may result in remote code execution.

Required action

All manufacturers have a responsibility to ensure they address the lack of sufficient cybersecurity in IoT devices. This is not an issue just for the IP surveillance industry, but for all IoT-based businesses.

Avira researchers recommend that the vulnerabilities in the Victure PC530 smart cameras are addressed as follows:

  • Fix unauthenticated telnet access with root privileges.
  • Build stronger authentication mechanisms.
  • Encrypt sensitive data (video and audio streams) even along with ONVIF service set. Use SRTSP used instead of RTSP.
  • Fix the gSOAP service Integer Overflow Vulnerability.

Last but not least, the lack of sufficient cybersecurity implementations in IoT devices is the next thing to tackle, not only for the IP surveillance industry but for all IoT-based businesses. Learn more about creating a secure IoT environment for customers.

Want to comment on this post?

We encourage you to share your thoughts on your favorite social platform.
IoT security camera vulnerability: Victure PC530

Alexander Vukcevic

Alexander joined Avira in 2000 and leads the Protection Labs & QA teams. He is passionate and enthusiastic about always delivering the best protection and highest quality to customers and partners. With more than 19 years of experience in the anti-malware industry Alex leads, guide and motivates his team to deliver market-leading detection for millions of customers.

You might like

IoT

Beyond the device: securing the IoT

Beyond the device: securing the IoT

Smart homes are probably vulnerable homes: Whose responsibility is it to secure the home – the home owner? The manufacturer of the device? How about the Internet service provider – after all, they are likely to suffer more than most when things go wrong.

1 year ago 3 min read
IoT

Should I be (more) paranoid after my IoT Christmas?

Should I be (more) paranoid after my IoT Christmas?

A comprehensive approach to mitigate the problem of an insecure smart home is to secure the network. This is in contrast to a single-minded focus on securing individual IoT devices, which will not be possible, for a long time yet.

1 year ago 3 min read
Corporate Responsibility

2018: Watch your step when the chips are down

2018: Watch your step when the chips are down

2018 will be a year of change: GDPR, threats to the IoT, nation states, feeling increasingly threatened by cryptocurrencies and the Internet giants…

1 year ago 3 min read