{"lastseen": "2019-05-29T18:17:08", "references": ["https://www.cybereason.com/cve-ip-cameras/", "https://www.cybereason.com/zero-day-exploits-turn-hundreds-of-thousands-of-ip-cameras-into-iot-botnet-slaves/"], "description": "A vulnerability in a custom-built GoAhead web server used on Foscam, Vstarcam, and multiple white-label IP camera models allows an attacker to craft a malformed HTTP (\"GET system.ini HTTP/1.1\

\

\" - note the lack of \"/\" in the path field of the request) request that will disclose the configuration file with the login password.", "edition": 1, "reporter": "cve@mitre.org", "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0"}, "exploitabilityScore": 3.9, "impactScore": 5.9}, "published": "2017-03-13T06:59:00", "title": "CVE-2017-5674", "type": "cve", "enchantments": {"score": {"value": 0.7, "vector": "NONE", "modified": "2019-05-29T18:17:08", "rev": 2}, "dependencies": {"references": [{"type": "avleonov", "idList": ["AVLEONOV:34A013D8D810B1494B0CB36FD94A3B3D"]}], "modified": "2019-05-29T18:17:08", "rev": 2}, "vulnersScore": 0.7}, "cwe": ["CWE-200"], "bulletinFamily": "NVD", "affectedSoftware": [{"name": "embedthis goahead", "operator": "eq", "version": "-"}], "cvss2": {"cvssV2": {"accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0"}, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvelist": ["CVE-2017-5674"], "modified": "2017-03-15T18:43:00", "cpe": ["cpe:/a:embedthis:goahead:-"], "id": "CVE-2017-5674", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5674", "viewCount": 70, "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N"}, "cpe23": ["cpe:2.3:a:embedthis:goahead:-:*:*:*:*:*:*:*"]}

{"avleonov": [{"lastseen": "2017-05-01T12:59:55", "bulletinFamily": "blog", "cvelist": ["CVE-2017-5674"], "description": "Today I want to talk today about privacy in a most natural sense. You probably have an internet-connected device with camera an microphone: smartphone, tablet, smart TV, ip camera, baby monitor, etc.



> - Can it be used to record video/audio and spy on you?

- Of course, yes!

- Only government and device vendor has resources to do it?

- Not really



![Somebody is watching you](https://avleonov.com/wp-content/uploads/2017/03/somebody_is_watching_you.png)



The sad truth is: most of internet-connected devices have security problems, and, unlike traditional desktops and servers, it's much harder to patch them. Even if the vendor fixed the issue. The customers, average people, just don't bother themselves to do it. Each week it's become easier to access user data and even get full control over device. Hackers and pranksters may do it just for lulz, because they can.



Let's see it on concrete examples.



### IP/Surveillance cameras



On this week [Cybereason disclosed critical vulnerability](<https://vulners.com/cve/CVE-2017-5674>) in Foscam US, VStarcam, and multiple white-label CCTV IP Cameras.



You can get configuration file with the login and password with only one request:



`GET system.ini HTTP/1.1\

\

`



![IP cam CVE-2017-5674](https://avleonov.com/wp-content/uploads/2017/03/IP_cam_cve.png)



What does this mean? Several million webcams will not disappear from the Internet anyway. Some of them show children. Some of them will destroy families. In many cases, the recorded content will be used for blackmailing.



And it's real. Just watch tons of [IP camera pranks on youtube](<https://www.youtube.com/results?search_query=IP+Cam+Trolling>)!



If this vulnerable camera is watching you at your workplace, it's the problem of responsible person in your organization. But if you use IP camera to control your home, to watch for your children - it's your problem and only you can deal with it.



### TVs



Well, I don't know why modern TVs should have built-in camera and mic. You can use your smart TV for Skype conferences but it's a bit it still a bit weird and potentially dangerous. Something in Orwell style.



Last week Wikileaks published information on [\u201cWeeping Angel\u201d malware](<https://vulners.com/thn/THN:DD35CA49BE6A6974C1C6E0CD6202FB4F>). It can transform smart TV\u2019s into microphones:



> Samsung smart TVs, which previously drew criticism for their always-on voice command system, are vulnerable to Weeping Angel hacks that place the TVs into a \u201cFake-Off\u201d mode. In Fake-Off mode, the TV owner believes it is off when it is actually on, allowing the CIA to record conversations \u201cin the room and sending them over the Internet to a covert CIA server.\u201d



However, this malware will not work on latest Samsung smart TV firmware. So, update it!



### Smartphones and Tablets



Mobile phones vulnerabilities on this week should be illustrated with [recent Emma Watson's incident](<https://vulners.com/thn/THN:658118884A7B9F01DBC91406BE294AE1>).



![](https://avleonov.com/wp-content/uploads/2017/03/220px-Emma_Watson_2013.jpg)



As you probably heard, some amount of private photo/video content leaked yesterday. Well, it's not clear how the attackers got this contents. In [pretty similar cases three years ago](<https://vulners.com/thn/THN:3D99A23BBAA32AB277259CC0946C6C51>) Apple iCloud access was obtained with some social engineering. But for sure, mobile devices and cloud services are not the best way to store sensitive data.



Once you took a photo with your smartphone, it can leak, simply because some malware was installed on the device. One of the main reasons why malware can work on the device is that the device is not updated and has some critical vulnerabilities. And how can it be updated if the manufacturer is not required to release updates even for most critical vulnerabilities, like [Stagefright](<https://vulners.com/exploitdb/EDB-ID:40436>)? And you can only put the latest version of Android on a very small amount of expensive smartphones, like [Nexus](<https://developers.google.com/android/images>) and [Sony Open Devices](<https://developer.sonymobile.com/open-devices/>). The rest of the Android users are forced to use the affected devices, because the vendor does not update promptly.



Moreover, malware can be preinstalled even on a a new device. For example, two days ago [Check Point Software Technologies found](<https://vulners.com/threatpost/38-ANDROID-DEVICES-INFECTED-WITH-MALWARE-PREINSTALLED-IN-SUPPLY-CHAIN/124275 Are you sure that you won't buy a hacked phone in a store?>) 38 Android handsets were infected with adware, information-stealing malware and ransomware, a collection of malicious code as sundry as the number of different manufacturers. Malware was pre-installed somewhere along the supply chain.



### In conclusion



Vulnerability Management and Vulnerability Intelligence are not only for big companies anymore. Every person, every household is like a \"microcorparation\" with own IT assets, sensitive data and risks. If you don't want your private staff become public and you don't want somebody frightened your child at night using remote access to the baby monitor (and you can find this kind of \"pranks\" on youtube as well) **YOU**, customer, should care about all this boring technical stuff:



* How vendor of your internet-connected device patches vulnerabilities?

* How to figure out that your device is vulnerable?

* How to figure out that somebody can get control of your device?

* How to update your device?

* What to do if it can't be updated?



Or just don't use connected devices with mics and camera. Or stick tape camera and microphone like [FBI Director James Comey](<https://vulners.com/thn/THN:46291A6A579A71577543E5E07482F34A>) and [Mark Zuckerberg](<https://vulners.com/thn/THN:36511AEA3DDB077762AA8ADBD65918A7>). It's of course not an option for devices, where permanent audio/video recording is the main function.



Welcome to a brave new world!



![](http://feeds.feedburner.com/~r/avleonov/~4/I9IhbLw0Tx8)", "modified": "2017-03-16T16:59:39", "published": "2017-03-16T16:59:39", "href": "http://feedproxy.google.com/~r/avleonov/~3/I9IhbLw0Tx8/", "id": "AVLEONOV:34A013D8D810B1494B0CB36FD94A3B3D", "title": "Somebody is watching you: IP camera, TV and Emma Watson\u2019s smartphone", "type": "avleonov", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:NONE/A:NONE/"}}]}