IOT SECURITY: CONSUMER DEVICES AND THE EXTENDED CORPORATE NETWORK



Similar documents
Eyes on IZON: Surveilling IP Camera Security

ArcGIS Server Security Threats & Best Practices David Cordes Michael Young

ibaby Monitor Model: M3s User Manual

What someone said about junk hacking

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Cloud Security:Threats & Mitgations

Topics in Network Security

3. Broken Account and Session Management. 4. Cross-Site Scripting (XSS) Flaws. Web browsers execute code sent from websites. Account Management

Step by Step Guide for Upgrading Your NetCamPro Camera to Cloud Mode Using an Android Device

CompTIA Mobile App Security+ Certification Exam (Android Edition) Live exam ADR-001 Beta Exam AD1-001

Introduction to the EIS Guide

ABSTRACT' INTRODUCTION' COMMON'SECURITY'MISTAKES'' Reverse Engineering ios Applications

SEAGATE BUSINESS NAS ACCESSING THE SHELL. February 1, 2014 by Jeroen Diel IT Nerdbox

TENVIS Technology Co., Ltd. User Manual. For H.264 Cameras. Version 2.0.0

Using Nessus In Web Application Vulnerability Assessments

The Internet of Fails Where IoT Has Gone Wrong and How We're Making It Right.

STABLE & SECURE BANK lab writeup. Page 1 of 21

Penetration Testing with Kali Linux

Amcrest 960H DVR Quick Start Guide

Introduction to Mobile Access Gateway Installation

FINAL DoIT v.8 APPLICATION SECURITY PROCEDURE

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Veracode White Paper The Internet of Things: Security Research Study. The Internet of Things: Security Research Study

Passing PCI Compliance How to Address the Application Security Mandates

1. Introduction What is Axis Camera Station? What is Viewer for Axis Camera Station? AXIS Camera Station Service Control 5

Pentesting Mobile Applications

CHAPTER 2: USING THE CAMERA WITH THE APP

How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering

Is Your SSL Website and Mobile App Really Secure?

DiamondStream Data Security Policy Summary

INSTRUCTION MANUAL Neo Coolcam IP Camera

Codes of Connection for Devices Connected to Newcastle University ICT Network

APPLICATION SECURITY: FROM WEB TO MOBILE. DIFFERENT VECTORS AND NEW ATTACK

Securing the Internet of Things: Mapping Attack Surface Areas Using the OWASP IoT Top 10

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Web Application Guidelines

Acano solution. Security Considerations. August E

Hardening Guide. Installation Guide

How Reflection Software Facilitates PCI DSS Compliance

What is Web Security? Motivation

BlackBerry Enterprise Service 10. Universal Device Service Version: Administration Guide

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Workday Mobile Security FAQ

Wireless PTZ Cloud Camera TV-IP851WC (v1.0r)

WEB SITE SECURITY. Jeff Aliber Verizon Digital Media Services

ABC LTD EXTERNAL WEBSITE AND INFRASTRUCTURE IT HEALTH CHECK (ITHC) / PENETRATION TEST

Installation Steps Follow these steps to install the network camera on your local network (LAN):

That Point of Sale is a PoS

CRYPTUS DIPLOMA IN IT SECURITY

Introduction to the Mobile Access Gateway

Secret Server Qualys Integration Guide

FileCloud Security FAQ

iviewer Monitoring Application for ipad, ipod, iphone and Android phones and tablets

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: Security Note

Internet Banking System Web Application Penetration Test Report

1. Central Monitoring System Software

Exploiting Foscam IP Cameras.

Wireless Day / Night Cloud Camera TV-IP751WIC (v1.0r)

Names of Parts. English. Mic. Record Button. Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook

SwannEye HD Security Camera Wi-Fi Connections Quick Setup Guide. Welcome! Lets get started.

AdRadionet to IBM Bluemix Connectivity Quickstart User Guide

We don t need no stinkin badges!

Mini P2P IP camera IPC-2016W

Advanced Configuration Administration Guide

Advanced ANDROID & ios Hands-on Exploitation

DPS Telecom Your Partners in Network Alarm Management

Five Steps to Improve Internal Network Security. Chattanooga ISSA

Web Application Vulnerability Testing with Nessus

The Trivial Cisco IP Phones Compromise

Quick Installation Guide

MaaS360 Mobile Enterprise Gateway

1. Central Monitoring System Software

Penetration Testing Report Client: Business Solutions June 15 th 2015

F-Secure Messaging Security Gateway. Deployment Guide

SECURITY TRENDS & VULNERABILITIES REVIEW 2015

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2

MaaS360 Mobile Enterprise Gateway

Shellshock Security Patch for X86

Thick Client Application Security


Medical Device Security: The Transition From Patient Privacy To Patient Safety. Scott Erven

SSL Tunnels. Introduction

FortiOS Handbook - Hardening your FortiGate VERSION 5.2.3

Norton Mobile Privacy Notice

Visa U.S.A Cardholder Information Security Program (CISP) Payment Application Best Practices

Security Considerations White Paper for Cisco Smart Storage 1

EM6230 e-camview HD outdoor IP camera

Names of Parts. English 1. Mic. Record Button. Status Indicator Micro SD Card Slot Speaker Micro USB Port Strap Hook

Getting Started Guide. November 25, 2013

Administrator Guide. v 11

Locking down a Hitachi ID Suite server

The Security of MDM systems. Hack In Paris 2013 Sebastien Andrivet

1 Introduction The package contents Function and Features Product Specification Appearance and interface

A Guide to New Features in Propalms OneGate 4.0

Transcription:

IOT SECURITY: CONSUMER DEVICES AND THE EXTENDED CORPORATE NETWORK

Get CPE Credits for this Webcast Attendees of this Webcast are eligible for 1 CPE credit Self-report on your organization s website Keep the email invitation as confirmation for possible future audits More info: http://bit.ly/r7cpe

Speakers Tod Beardsley Research Manager Rapid7 Mark Stanislav Senior Security Consultant Rapid7 Michael McNeil Global Product Security & Services Officer Philips Healthcare

Hacking IoT Baby Monitors Mark Stanislav, Sr. Security Consultant

What Does an Internet-Connected Monitor Offer? Connected Features (via a Web Site and/or a Mobile Application) Viewing a live stream locally (the home s Wi-Fi) or remotely (Internet) Controlling the camera s position via pan, tilt, and zoom functionality Communicating audio through the monitor (i.e. two-way audio) Playing music or other recorded audio clips (i.e. bring your own lullabies) Manage device preferences such as the audio volume and night vision Share access and provide privileges to other people (e.g. family, friends) Access recordings for humidity, temperature, noise, and/or motion alerts Remote (e.g. SaaS, FTP) and local (e.g. Micro SD) DVR recordings

A Mess of Dependencies and Attack Surface Many IoT baby monitors leverage third-party services, firmware, and software Some vendors put a lot of trust in their supply chain without testing security Implementation errors or failure to comply with best practices also occurs Complex ecosystems means that there are plenty of ways to screw up: Mobile applications, cloud services, backend services, web applications, firmware, hardware, network protocols, wireless protocols, & cryptography It s difficult for a single IoT vendor to be proficient in security across all of it The frameworks, protocols, and design patterns of IoT are still very much in flux

SO, HOW DO WE HACK THESE THINGS?

Via Dumping Firmware Pomona SOIC Clip + Bus Pirate flashrom to Dump Flash binwalk to Extract Filesystems

Via Brute Force of Various Means Hash Cracking with cudahashcat Scouring Google for Useful Details

Via Serial Console (UART) JTagulator (or Bus Pirate, Shikra, etc.) U-Boot Configuration UART Scan & Connect

Via JTAG (e.g. Dumping Memory via GDB) Not a baby monitor but you get the idea!

Find API End-Points with Clutch + strings for ios Via Mobile Applications Acquire Firmware with dex2jar + JD-GUI for Android View API Calls with mitmproxy (esp. SSL/TLS)

Via Network Analysis Uncover Network Services with nmap View Protocol Details with wireshark

Via Web Applications Hidden Administrative Web Interface XSS on Camera Cloud Web Service

THE BABY MONITORS

A Variety of Vendors, Styles, Costs, & Features Vendor Model Price Amazon Rank* / Stars Two-Way Audio Pan Tilt Zoom Wi-Fi Ethernet Gynoii GCW-1010 $89.34 #56 / 3.8 ibaby M3S $169.95 #243 / 3.4 ibaby M6 $199.95 #31 / 3.7 Lens LL-BC01W $54.99 #149 / 2.8 Philips B120/37 $77.54 #N/A / 2.2 Summer 28630 $199.99 #64 / 3.1 TRENDnet TV-IP743SIC $69.99 #N/A / 3.5 WiFiBaby WFB2015 $259.99 #156 / 3.2 Withings WBP01 $204.60 #101 / 2.9 * Amazon Ranking Based on Category Baby > Safety > Monitors, Which Includes Non-IoT Baby Monitors

THE FINDINGS

Withings WBP01 - $204.60

Disabled Doesn t Quite Mean What it Used To 20 Minutes Later The Stream Still Works! After a stream exists, disabling it via the app doesn t actually stop it

When Obfuscation Goes Wrong, or, Not at All? At first, this looks like a really poor attempt at an obfuscation method to hide the password for this web service account. On further review, however, the mchunk method simply returns at the start of the for loop, yielding the output from the input to be a concatenation of ff and the integer passed as a parameter. Was this obfuscation intended to be enabled? Did someone give up on their dream of confusing reverse engineers? The world may never know

WiFi Baby WFB2015 - $259.99

Nothing Makes Sense to Me Any More Unauthenticated Log With Stream Details Hardcoded SSL Cert That s Not Even Used

UPnP Bugs: Alive and Well in Baby Monitoring UPnP RCE Bugs, CVE-2012-5958 & CVE-2012-5959

Lens Peek-A-View (LL-BC01W) - $54.99

If You Needed Some Free Cloud Storage [redacted] An FTP Account Per Camera, Apparently Used for Configuration Backups

Backdoor Credentials Galore Hidden Web Interface Credentials Cracking the Linux admin Password This account has functional root privilege due to ugly permissions The Live Stream Passes Credentials in URL over HTTP

Gynoii GCW-1010 - $89.34

Unencrypted Web Services - Local and Cloud Local Administrative API Calls Hidden Device Web Interface Vendor Cloud API Calls Third-Party Streaming Service None of these services or APIs use any encryption and often pass sensitive credentials and keys

TRENDnet TV-IP743SIC - $69.99

2-for-1 Unencrypted Web Service + XSS [redacted] Either MITM a User or Just BYOJS to their DOM:)

A Remote Shell Waiting to Happen Username: root Password: admin Telnet Available, Just Not Default Pro Tip: Remove Remote Access Services, Don t Just Disable Them!

ibaby M3S - $169.95

Uncovering Backdoor Linux Accounts & Access An nmap Scan Reveals Telnet :) Username: admin Password: admin Password is Protected by UNIX Crypt * FYI, there is no root on here, only admin

ibaby M3S - A Historical Look at Software? U-Boot: 1.1.3, released August 14th, 2005 OpenSSL: 0.9.8e, released February 23rd, 2007 Linux Kernel: 2.6.21, released April 26th, 2007 BusyBox: 1.12.1, released September 28th, 2008 UNIX Crypt: First appeared in 1979, limited to 8-character passwords Telnet: Developed in 1968 SSH-1 came out in 1995

Encryption! Just Not Great Choices For it :) Encrypted Backups with a Hardcoded Password? Stream Encryption with XXTEA?

ibaby M6 - $199.95

Cryptography? Naw, They Are Just Babies Unencrypted Web Service Login Unencrypted Mobile API Calls Telnet & Unencrypted HTTP on Device

This is the ibaby Cloud Web Site Today Login for Camera Owners and What is Now Returned on Login

But a Few Months Ago, Direct Object Reference! < Proper Account Attacker Account > No Authorization/Privilege Given to Our Attacker Account

Full Access to All Audio & Motion Alert Videos Attacker Account > [redacted] [redacted] [redacted] [redacted] Don t let the broken images fool you there s live data ready to be viewed! View Source -> Find AVI Filename -> Access Static CloudFront URL

Unauthenticated Access to Unencrypted Videos Mobile API Call for Alert Video Retrieval Example AVI Thumbnail File [redacted] [redacted] [redacted] Video Downloads via Amazon CloudFront URLs are not requested via HTTPS [redacted] No IAM credentials or signed URLs

and Some Weirdly Exposed Web Applications? Apparently There s a Private Wiki. What For? No Clue. But an Admin Site? Now That s an Interesting Find!

Philips In.Sight B120/37

Everything Old is New Again My IZON Research - 2013 My InSight Research - 2015 The question is Did security issues fixed by one camera manufacturer ever trickle into devices also leveraging the same firmware?

A Quick Look at Old Security Issues Still There No SSL on Backend Web Service Insecure Firmware Upgrade Process Multiple Hardcoded Linux Accounts Telnet Enabled by Default (Until Recently) Shout out to Paul Price for his research into the In.Sight M100 which shares a few issues from my old Stem Innovation IZON research and subsequent research into the In.Sight B120. Check out his site detailing this and other research at ifc0nfig.com!

A Few Newer Issues. But Wait, There s More! :) Backdoor Telnet Enablement Script Username: root Password: b120root Predictable admin Web Service Password Multiple XSS on Web Service Portal

Unauthenticated Administrative Camera Access Camera HTTP Reverse Proxy User Web Service HTTP/80 Home Network Internet Clear Text Clear Text Clear Text When a remote end user requests their camera s stream, an HTTP reverse proxy is opened on a public host & port number, directly to the camera s backend web service, allowing for a remote attacker to achieve the following: Unauthenticated and unencrypted video/audio stream access to the user s camera Full administrative access to the camera s powerful backend web service This includes manipulating camera configuration or even re-enabling Telnet

Finding Exposed Cameras on the Internet The reverse proxy is setup by the stream provider, Yoics, and has a finite number of enumerable hostnames, each with about ~30,000 possible ports that may be utilized. While this may seem like a lot, an attacker could test this entire range every minute to look for exposed cameras with a simple script or perhaps something powerful like zmap. Unencrypted, Unauthenticated Remote Camera Access Take David Adrian s Word For It :) Now Friends Can Remotely Enable Telnet For You! :)

Summer Infant Baby Zoom (28630) - $199.99

Oh, Be Sure to Change Your Password Default New User Passwords == Last name (truncated to 8 characters) + Group ID This is not required to be changed on first login and could be enumerated if someone knows that you have this device simply iterate over group ID integers!

Adding a Privileged User to Any & All Cameras Before After! This HTTP call could be ran against all possible IDs

Coordinated Disclosure Timeline Initial Vendor Disclosure July 4th, 2015 Because America! CERT Disclosure July 21st, 2015 17 Days After Vendor Disclosure Public Disclosure September 2nd, 2015 60 Days After Vendor Disclosure

A Modest Baby Monitor Security Checklist Vendor Model Local API HTTP SSL Cloud API HTTP SSL No Remote Shell No Hidden Accounts No Known Vulns No UART Access All Streams Encrypted Gynoii GCW-1010 ibaby M3S N/A ibaby M6 Lens LL-BC01W Philips B120/37 Summer 28630 TRENDnet TV-IP743SIC WiFiBaby WFB2015 N/A Withings WBP01 N/A

Scoring Baby Monitors for Overall Security Security Concern Description of Concern Penalty for Missing Local API HTTP SSL All local web service/api calls should be encrypted, regardless of being on a LAN. -20 Points Cloud API HTTP SSL All Internet-facing web service/api calls should be encrypted, including registration. -30 Points No Remote Shell The presence of a remote shell (e.g. Telnet, SSH) create additional attack surface. -50 Points No Hidden Accounts All accounts, whether web services or shell access should be known to customers. -30 Points No Known Vulns All portions of the camera s supply chain should be free of serious vulnerabilities. -75 Points No UART Access Devices should disable direct serial access and definitely not drop to a root shell. -10 Points All Streams Encrypted All video/audio streams, whether live or recorded, should be encrypted end-to-end. -35 Points All Cameras Start With 250 Points and Receive Deductions

Baby Monitor by Security Score & Grade Vendor Model Price Amazon Rank / Stars Score Grade* Gynoii GCW-1010 $89.34 #56 / 3.8 75 F ibaby M3S $169.95 #243 / 3.4 160 D ibaby M6 $199.95 #31 / 3.7 0 F Lens LL-BC01W $54.99 #149 / 2.8 125 F Philips B120/37 $77.54 #N/A / 2.2 30 F Summer 28630 $199.99 #64 / 3.1 100 F TRENDnet TV-IP743SIC $69.99 #N/A / 3.5 50 F WiFiBaby WFB2015 $259.99 #156 / 3.2 80 F Withings WBP01 $204.60 #101 / 2.9 95 F Baby is Unsatisfied * Grading Scale Based on Points: F: < 150 (<60%) ; D: 150-174 (60-69%) ; C: 175-199 (70-79%) ; B: 200-224 (80-89%) ; A: 225-250 (90-100%)

But Really? 1. The ibaby M6, Summer, and Philips all had what I would consider critical security issues that make them a deal breaker, despite their overall scoring. 2. Only the ibaby M3S had apparent encryption for all streaming of content and even then, it s not exactly industry standard and has its own potential issues. 3. More vulnerabilities likely exist such as RCE, XSS, and CSRF in backend web applications in addition to already noted backdoor credentials/interfaces. 4. Frankly? Nine devices were way too much and while I am satisfied in the issues that were found, there s a lot I probably missed others may find!

Conclusions 1. The status quo of security for connected baby monitors is deeply concerning. 2. Even the best cameras tested were well below what I d consider secure. 3. Consumers are woefully unaware that camera security features such as endto-end encryption of audio/video and well defined, secured access don t exist. 4. It s highly unlikely, based on the issues found, that any of these vendors have third-party security audits and/or a security-focused development program. Parents and their children deserve better. Whether you paid $54.99 or $259.99, a minimum level of security should be expected, and achieved, for all baby monitors.

Not All Hope is Lost, However :) BuildItSecure.ly: Initiative targeted at sharing technical resources with IoT engineering teams and pairing IoT vendors with pro-bono security researchers. OWASP IoT Top 10: Provides vendors a list of the top 10 areas of IoT security that should be focused on during development to ensure a secure ecosystem. Cloud Security Alliance: Released a guidance document targeted at IoT engineering teams to ensure more security during design/development. Google Projects: Brillo is a hardened, stripped-down version of Android for IoT, while secure Weave is a secure solution for inter-device communication.

Thanks! Questions? Mark Stanislav mstanislav@rapid7.com @markstanislav