Warning Issued Over Hackable ADT’s LifeShield Home Security Cameras

  • Newly identified security vulnerabilities in ADT’s Blue (formerly LifeShield) house security cameras could have been exploited to hijack both equally audio and online video streams.

    The vulnerabilities (tracked as CVE-2020-8101) ended up discovered in the video doorbell camera by Bitdefender scientists in February 2020 in advance of they ended up ultimately resolved on August 17, 2020.

    LifeShield was acquired by Florida-based ADT Inc. in 2019, with Lifeshield’s Diy house security alternatives rebranded as Blue as of January 2020. The company’s products and solutions had a 33.6% sector share in the U.S. previous calendar year.

    The security issues in the doorbell digicam permit an attacker to

    • Receive the administrator password of the digicam by simply just recognizing its MAC handle, which is applied to determine a system uniquely
    • Inject instructions locally to obtain root accessibility, and
    • Accessibility audio and video feeds making use of an unprotected RTSP (Actual-Time Streaming Protocol) server

    The doorbell is built to periodically send heartbeat messages to “cms.lifeshield.com,” that contains information and facts this sort of as the MAC tackle, SSID, neighborhood IP deal with, and the wireless sign power. The server, in return, responds with an authentication message that can be trivially bypassed by crafting a phony ask for by utilizing the device’s MAC tackle.

    “The server looks to disregard the token and checks only the MAC deal with when sending a response,” the researchers observed, adding “the password for the administrator can be received by decoding the foundation64 authorization header received in this request.”

    Armed with this admin access to the camera’s web interface, the attacker can leverage an HTTP interface that is susceptible to command injection and get root entry.

    Finally, the scientists also identified that an unsecured RTSP server sans any qualifications could be exploited to access the video clip stream at “rtsp://10…108:554/img/media.sav” utilizing any media participant this sort of as VLC.

    Though patches have been used to the production servers and all the 1,500 afflicted gadgets, with no simple way to affirm if the camera users installed the firmware updates, Bitdefender selected to hold off public disclosure by much more than 5 months.

    “Clients have security selections when it will come to securing their good homes or small companies,” the researchers stated.

    “Cautiously exploring IoT sellers for security update guidelines to their merchandise, altering default passwords, separating IoTs into distinct subnetworks, and even consistently checking for firmware updates are only a handful of simple and fingers-on security suggestions that any person can adhere to.”

    Found this short article fascinating? Comply with THN on Fb, Twitter  and LinkedIn to read additional exclusive articles we publish.