Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

Critical flaw lets hackers take control of Samsung SmartCam cameras

Accepted submission by exec at 2017-01-18 02:50:03
News

Story automatically generated by StoryBot Version 0.2.2 rel Testing.
Storybot ('Arthur T Knackerbracket') has been converted to Python3

Note: This is the complete story and will need further editing. It may also be covered
by Copyright and thus should be acknowledged and quoted rather than printed in its entirety.

FeedSource: [ComputerWorld]

Time: 2017-01-16 18:36:03 UTC

Original URL: http://www.computerworld.com/article/3158204/security/critical-flaw-lets-hackers-take-control-of-samsung-smartcam-cameras.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+computerworld%2Fnews%2Ffeed+%28Latest+from+Computerworld%29#tk.rss_all [computerworld.com] using UTF-8 encoding.

Title: Critical flaw lets hackers take control of Samsung SmartCam cameras

--- --- --- --- --- --- --- Entire Story Below --- --- --- --- --- --- ---
 
 

Critical flaw lets hackers take control of Samsung SmartCam cameras

Arthur T Knackerbracket has found the following story [computerworld.com]:

The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them.

The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past.

The flaw allows for command injection through a web script, even though the vendor has disabled the local web-based management interface in these devices.

The Samsung SmartCam is a series of cloud-enabled network security cameras that were originally developed by Samsung Techwin. Samsung sold this division to South Korean business conglomerate Hanwha Group in 2015 and the company was renamed Hanwha Techwin.

In response to vulnerabilities reported [pentestpartners.com] in the web-based management interface of various SmartCam models over the past few years, Hanwha Techwin decided to completely disable the local administration panel and allow users to access the cameras only through the accompanying smartphone app and its My SmartCam cloud service.

The Exploiteers researchers recently analyzed the Samsung SmartCam SNH-1011 and noticed that, while accessing the web interface over the local network was no longer possible, the web server was still running on the device and hosted some PHP scripts related to a video monitoring system called iWatch.

One of these scripts allows users to update the iWatch software by uploading a file, but has a vulnerability that stems from improper sanitization of the file name. The flaw can be exploited by unauthenticated attackers to inject shell commands that will then be executed by the web server running with root privileges.

"The iWatch Install.php vulnerability can be exploited by crafting a special filename which is then stored within a tar command passed to a php system() call," the researchers explained in a blog post [exploitee.rs] Saturday. "Because the web-server runs as root, the filename is user supplied, and the input is used without sanitization, we are able to inject our own commands within to achieve root remote command execution."

While the flaw was found in the SNH-1011 model, the researchers believe that it affects the entire Samsung SmartCam series.

Ironically, the vulnerability can be exploited to turn on the disabled web-management interface, whose removal was criticized by some users. The Exploiteers published a proof-of-concept exploit [exploitee.rs] that does just that. They also provided instructions on how to manually patch the flaw.

Re-enabling the web interface will allow users to monitor the camera feed via the local network again without having to use the My SmartCam service. But there's a catch: It also reactivates some of the old vulnerabilities that the vendor mitigated by simply disabling the interface in the first place.

-- submitted from IRC


Original Submission