Peekaboo: Tenable spotlights vulnerability that could allow manipulation of surveillance footage - Technical.ly Baltimore

Dev

Sep. 18, 2018 3:30 pm

Peekaboo: Tenable spotlights vulnerability that could allow manipulation of surveillance footage

The Columbia-based cybersecurity firm released new research on software used in public spaces around the world.
Tenable warns security cameras could be vulnerable.

Tenable warns security cameras could be vulnerable.

(Photo by Flickr user Rusty Clark, used under a Creative Commons license)

Tenable, the recently IPO’d, Columbia-based cybersecurity companyreleased new research this week showing a security vulnerability in software that powers video surveillance systems.

The “Peekaboo” vulnerability could leave open the potential for attackers to take control of and potentially manipulate footage from software created by NUUO, which is used around the world. Called NVRMini2, the device is a storage device and mini recorder, Tenable states in a blog post. Here’s what they found, according to Techcrunch:

The vulnerability works via a stack buffer overflow, overwhelming the targeted software and opening the door for remote code execution. That loophole means that an attacker could remotely access and take over accounts with no authorization, even taking over networked cameras connected to the target device.

Jacob Baines, a senior research engineer at Tenable, developed an exploit demonstrating what could happen.

“An attacker can gain full system access, giving them control over and access to attached camera feeds and recordings. In addition, access credentials for connected cameras can be read in cleartext,” Tenable writes.

In the blog post, Tenable said NUUO’s software is used by third-party vendors through white-labeling and licensing, so the full list of those affected are unknown.

Advertisement

A patch was not immediately available Monday, but Tenable said NUUO was developing one.

“In the meantime, we advise affected end users to restrict and control network access to the vulnerable devices to authorized and legitimate users only,” the company stated.

The vulnerabilities in surveillance systems are among the concerns of cybersecurity pros working on securing devices. Last year, Fulton-based ReFirm Labs found vulnerabilities in specific models of security cameras.

-30-
BECOME A CONTRIBUTOR TO THE JOURNALISM FUND TO COMMENT
Already a contributor? Sign in here
Connect with companies from the Technical.ly community
New call-to-action

Advertisement

An AI weapons detection system will be tested at Camden Yards

These Howard County cybersecurity companies formed a biz partnership

How DreamPort is creating space for collaboration on cyber challenges

SPONSORED

Baltimore

Why two eminent Baltimore higher-ed institutions collaborated to create this unique dual degree program

Philadelphia

Vistar Media

Sr. Software Engineer

Apply Now

Philadelphia

Vistar Media

Front End Engineer

Apply Now

Baltimore, MD

14 West

BI TechOps Analyst

Apply Now

This Md. cyber company is working to protect local nonprofits from ransomware

Power Moves: Leadership changes at CAMI and Maryland Momentum Fund

UMBC and UMB are joining forces to protect and probe medical data

SPONSORED

Baltimore

What Asymmetrik is doing to help lead healthcare’s digital transformation

Baltimore, MD

14 West

Scrum Master

Apply Now

Baltimore, MD

14 West

Lead Qlik Developer

Apply Now

Baltimore, MD

14 West

Senior Qlik Developer

Apply Now

Sign-up for daily news updates from Technical.ly Baltimore

Do NOT follow this link or you will be banned from the site!