Menu
Authentication bypass bug exposes Foscam webcams to unauthorized access

Authentication bypass bug exposes Foscam webcams to unauthorized access

Remote users can access the video stream without a username and password

The software used by many wireless IP cameras manufactured by Foscam Digital Technologies have a vulnerability that allows remote users to access their video streams and take snapshots without proper authentication.

The issue was reported on the Foscam technical support forum this week by the owner of a Foscam FI8905W Wireless IP Camera that's built for outdoor environments.

"I discovered fairly early in my testing, that the user could just press OK in the dialogue window without filling in a user or password and they would be taken to the image," a user with the nickname SENWiEco said Monday. The camera was running the latest firmware version at the time -- 11.35.2.54, he said.

A regular forum user and software developer named Don Kennedy who uses the nickname TheUberOverLord subsequently investigated the issue and concluded that other indoor and outdoor camera models from Foscam's MJPEG series have the same issue. Kennedy tracked down the problem to the software's user management system.

Foscam MJPEG cameras support as many as eight separate user accounts with different privileges: Administrator, Operator and Visitor. The user administration interface has eight user ID fields, but only one of them is configured by default with user name "admin" and privilege Administrator. The rest are blanked out and have the Visitor privilege assigned by default.

According to Kennedy, if any of the eight user slots is left empty -- with no username and password configured -- it's possible to access the camera by simply hitting OK on the authentication prompt. This will give the remote user Visitor privileges and allow them to access video streams with or without audio, take snapshots and execute any CGI commands available to the Visitor access level.

A workaround is to manually configure user names and passwords for all eight user ID fields, Kennedy said. However, this has the downside of exposing the camera to denial-of-service attacks.

According to Kennedy, there's a second bug that causes the camera to freeze after a certain number of failed attempts to access the camera without a user name and password. In this happens, the camera owner might need to restart the camera by powering it down and back up, he said.

This could be inconvenient, especially since many of these cameras are set up so they can be monitored remotely, so their owners might not immediately have physical access to them.

The issue appears to be restricted to system firmware version .54 for the MJPEG Indoor and Outdoor camera models, Kennedy said Monday on the forum. "The following MJPEG based camera models have a system firmware version of .54 currently released: FI8904W, FI8905E, FI8905W, FI8906W, FI8907W, FI8909W, FI8910E, FI8910W, FI8916W, FI8918W and FI8919W," he said at the time.

However, it appears that Foscam released firmware version .55 for some of those camera models Thursday. The firmware update is available for download from the company's website and its changelog file specifies that it fixes a bug allowing the execution of CGI commands without authentication. The update also prevents using blank spaces in the user name field and adds support for special characters in passwords.

In an update on the Foscam forum, Kennedy confirmed that version .55 of the firmware fixes the unauthorized access vulnerability. However it does not resolve the camera freeze issue, he said.

This means an attacker who repeatedly tries to access Internet-facing cameras running the new .55 firmware version with a blank user name and password might end up temporarily disabling those cameras.

Foscam did not immediately respond to an inquiry seeking clarifications about which affected models haven't received the .55 firmware update and the denial-of-service issue.

A security notice on the company's U.S. website that appears to be updated periodically currently reads: "Foscam is fully committed to maintaining the safety and integrity of our user experience and will take all action reasonably necessary to ensure the privacy and security of our cameras. As soon as a security vulnerability is revealed Foscam endeavors to immediately release a firmware update to fix the issue. As of January 19, 2014, there are no known vulnerabilities with any of our cameras once updated with the latest firmware as outlined below. All cameras currently sold by Foscam.us are upgraded with the latest firmware."

In the same message the company recommends changing the default user name and password of the camera, changing the default port for remote access and regularly checking the camera's logs, which can reveal unauthorized access attempts.

In April, security researchers from Qualys reported several security weaknesses in Foscam cameras and said that using the Shodan search engine they were able to find more than 100,000 cameras connected to the Internet. They estimated at the time that two out of every 10 of those cameras allow users to log in with the default "admin" user and no password.

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags patchesintrusionFoscam Digital TechnologiessecurityAccess control and authenticationExploits / vulnerabilitiesprivacyqualys

Featured

Slideshows

Educating from the epicentre - Why distributors are the pulse checkers of the channel

Educating from the epicentre - Why distributors are the pulse checkers of the channel

​As the channel changes and industry voices deepen, the need for clarity and insight heightens. Market misconceptions talk of an “under pressure” distribution space, with competitors in that fateful “race for relevance” across New Zealand. Amidst the cliched assumptions however, distribution is once again showing its strength, as a force to be listened to, rather than questioned. Traditionally, the role was born out of a need for vendors and resellers to find one another, acting as a bridge between the testing lab and the marketplace. Yet despite new technologies and business approaches shaking the channel to its very core, distributors remain tied to the epicentre - providing the voice of reason amidst a seismic industry shift. In looking across both sides of the vendor and partner fences, the middle concept of the three-tier chain remains centrally placed to understand the metrics of two differing worlds, as the continual pulse checkers of the local channel. This exclusive Reseller News Roundtable, in association with Dicker Data and rhipe, examined the pivotal role of distribution in understanding the health of the channel, educating from the epicentre as the market transforms at a rapid rate.

Educating from the epicentre - Why distributors are the pulse checkers of the channel
Kiwi channel reunites as After Hours kicks off 2017

Kiwi channel reunites as After Hours kicks off 2017

After Hours made a welcome return to the channel social calendar last night, with a bumper crowd of distributors, vendors and resellers descending on The Jefferson in Auckland to kickstart 2017. Photos by Maria Stefina.

Kiwi channel reunites as After Hours kicks off 2017
Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow exclusively introduces Tenable Network Security to A/NZ channel

Arrow Electronics introduced Tenable Network Security to local resellers in Sydney last week, officially launching the distributor's latest security partnership across Australia and New Zealand. Representing the first direct distribution agreement locally for Tenable specifically, the deal sees Arrow deliver security solutions directly to mid-market and enterprise channel partners on both sides of the Tasman.

Arrow exclusively introduces Tenable Network Security to A/NZ channel
Show Comments