Submitted via IRC for SoyCow3196
Google Nest Security Cam Bugs Allow Device Takeover
Eight vulnerabilities would allow a range of attacker activities, including taking the Nest camera offline, sniffing out network information and device hijacking.
Multiple vulnerabilities in Google’s Nest Cam IQ connected indoor security camera would allow an attacker on the same network to take over the device, execute code on it and/or take it offline.
Nest Labs’ Cam IQ Indoor integrates security-enhanced Linux in Android, Google Assistant and facial recognition all into a compact security camera, according to Cisco Talos, whose Lilith Wyatt and Claudio Bozzato discovered the bugs.
“It primarily uses the Weave protocol for setup and initial communications with other Nest devices over TCP, UDP, Bluetooth and 6lowpan,” they explained in a Monday write-up. “Most of these vulnerabilities lie in the weave binary of the camera, however, there are some that also apply to the weave-tool binary.”
There are eight vulnerabilities total; three of them are denial-of-service (DoS) bugs that an attacker could use to disable the camera; two would allow code execution; and the other three could be used for information disclosure.
(Score: 2) by JoeMerchant on Sunday August 25 2019, @01:43PM
Please, please publish these vulnerabilities... I have a Dropcam - cum Nestcam - cum Googlecam that recently cloud updated its firmware and now shows the bright blue "you're on camera" light.
It's a nice physical design, decent-ish video quality (far from the advertised HD, but adequate), and the one thing that is missing, in my opinion, is a way to tie it in to standard "on my local network" video camera monitoring apps like VLC, the Kodi add-ons, etc.
If that's "pwning" the camera, I consider it my right as purchaser and present owner of the camera installed on my local network to do so.
🌻🌻 [google.com]