Top IoT platform vulnerabilities put 100+ million devices at risk — security cameras and baby monitors under threat
Security cameras and baby monitors under threat by new supply chain vulnerabilities
Several vulnerabilities have been identified by Bitdefender in the ThroughTek Kalay Platform, upon which huge numbers of devices rely upon for IoT integration.
The flaws have severe ramifications for vendors further down the supply chain, with a number of prominent security cameras for businesses and domestic use suffering from a chain of vulnerabilities that provide root access from the local networks, and in some cases fully compromise the device.
The impacted cameras have been identified as the Owlet Cam v1 and v2, Roku Indoor Camera SE, and Wyze Cam v3.
Vulnerabilities through the lens
Supply chain attacks are becoming an increasingly lucrative target for threat actors, and not just for IoT devices. By finding vulnerabilities in software at the top of the supply chain, it is possible to exploit a range of software, services and devices further down the chain.
In this case, the software at the top is the ThroughTek Kalay platform which powers over 100 million devices around the globe, many of which are security oriented devices such as surveillance cameras.
The vulnerabilities identified by Bitdefender for this platform are tracked as CVE-2023-6321, which allows an authenticated user to run system commands as the root user leading to full compromise of the device, and CVE-2023-6322, which enables attackers to gain root access through a stack-based buffer overflow vulnerability in the handler of an IOCTL message, typically employed in configuring motion detection zones in cameras.
Further vulnerabilities, tracked as CVE-2023-6323 and CVE-2023-6324, can be combined with the aforementioned in a number of stacked combinations to allow attackers to gain access to the devices. The first allows a local attacker to leak the AuthKey secret by impersonating the P2P cloud server used by the device, with the second vulnerability allowing a local attacker to infer the pre-shared key for a DTLS session by forcing an empty buffer.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!
These vulnerabilities were first spotted by Bitdefender on October 19 2023, and have since been patched by their individual vendors. Bitdefender urges owners of the affected devices to ensure that all device updates are installed as and when they become available to mitigate existing and future vulnerabilities.
More from TechRadar Pro
- These are the best endpoint protection services
- Microsoft fixes software bug that could have left devices open to malware
- Get rid of that pesky trojan with the best malware removal tools
Benedict has been writing about security issues for over 7 years, first focusing on geopolitics and international relations while at the University of Buckingham. During this time he studied BA Politics with Journalism, for which he received a second-class honours (upper division), then continuing his studies at a postgraduate level, achieving a distinction in MA Security, Intelligence and Diplomacy. Upon joining TechRadar Pro as a Staff Writer, Benedict transitioned his focus towards cybersecurity, exploring state-sponsored threat actors, malware, social engineering, and national security. Benedict is also an expert on B2B security products, including firewalls, antivirus, endpoint security, and password management.