Menu
Critical flaw lets hackers take control of Samsung SmartCam cameras

Critical flaw lets hackers take control of Samsung SmartCam cameras

A command injection vulnerability gives attackers full control over the cameras

The popular Samsung SmartCam security cameras contain a critical remote code execution vulnerability that could allow hackers to gain root access and take full control of them.

The vulnerability was discovered by researchers from the hacking collective the Exploiteers (formerly GTVHacker), who have found vulnerabilities in the Samsung SmartCam devices in the past.

The flaw allows for command injection through a web script, even though the vendor has disabled the local web-based management interface in these devices.

The Samsung SmartCam is a series of cloud-enabled network security cameras that were originally developed by Samsung Techwin. Samsung sold this division to South Korean business conglomerate Hanwha Group in 2015 and the company was renamed Hanwha Techwin.

In response to vulnerabilities reported in the web-based management interface of various SmartCam models over the past few years, Hanwha Techwin decided to completely disable the local administration panel and only allow users to access the cameras through the accompanying smartphone app and its My SmartCam cloud service.

The Exploiteers researchers recently analyzed the Samsung SmartCam SNH-1011 and noticed that while accessing the web interface over the local network was no longer possible, the web server was still running on the device and hosted some PHP scripts related to a video monitoring system called iWatch.

One of these scripts allows users to update the iWatch software by uploading a file, but has a vulnerability that stems from improper sanitization of the file name. The flaw can be exploited by unauthenticated attackers to inject shell commands that will then be executed by the web server running with root privileges.

"The iWatch Install.php vulnerability can be exploited by crafting a special filename which is then stored within a tar command passed to a php system() call," the researchers explained in a blog post Saturday. "Because the web-server runs as root, the filename is user supplied, and the input is used without sanitization, we are able to inject our own commands within to achieve root remote command execution."

While the flaw was found in the SNH-1011 model, the researchers believe that it affects the entire Samsung SmartCam series.

Ironically the vulnerability can be exploited to turn on the disabled web management interface, whose removal was criticized by some users. The Exploiteers published a proof-of-concept exploit that does just that. They also provided instructions on how to manually patch the flaw.

Re-enabling the web interface will allow users to monitor the camera feed via the local network again without having to use the My SmartCam service. But there's a catch: it also reactivates some of the old vulnerabilities that the vendor mitigated by simply disabling the interface in the first place.

Subscribe here for up-to-date channel news

Follow Us

Join the New Zealand Reseller News newsletter!

Error: Please check your email address.

Tags hacking

Featured

Slideshows

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards

Revealed at a glitzy bash in Sydney at the Ivy Penthouse, the first StorageCraft Partner Awards locally saw the vendor honour its top-performing partners with ASI Solutions, SMBiT Pro, Webroot, ACA Pacific and Soft Solutions New Zealand taking home the top awards. Photos by Maria Stefina.

StorageCraft celebrates high achievers at its inaugural A/NZ Partner Awards
Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip

​Synnex and Lenovo hosted 18 resellers for an action-packed weekend adventure in RotoVegas, taking in white water rafting on the Kaituna River, as well as quad biking and dinner at Stratosfare​, overlooking Lake Rotorua at the top of Mount Ngongotaha​. Photos by Synnex.

Kiwi resellers make a splash on Synnex and Lenovo RotoVegas road trip
Show Comments