Smart home systems are omegle sex videossupposed to make our lives easier and safer -- but some of the most popular connected security cameras could make your place an easy target if your neighborhood is visited by a tech-savvy burgling crew.
Security researcher Jason Doyle recently published a set of three vulnerabilities he found in Google's Nest cameras. The flaws, which take advantage of the camera system's always-on Bluetooth, allow anyone within the devices' Bluetooth Low Energy (BLE) range to overwhelm them and shut them down.
Doyle claims he reported the flaws to Google back in October when he first found them, but the company has yet to offer any updates to fix the issues. He decided to go public with the information last week to inform Nest users of their potential vulnerability.
SEE ALSO: Ultimate Zelda superfan rigs smart home to respond to ocarinaModels affected by the vulnerabilities include the Dropcam, Dropcam Pro, Nest Cam Outdoor and Nest Cam Indoor running version 5.2.1 of Nest's firmware.
The first two flaws can be exploited by sending the camera overlong Wi-Fi SSID parameters or a encrypted password parameters. This triggers a buffer overflow condition, which causes the cameras to stop recording, crash and reboot.
The third flaw is a bit different: it knocks the camera from its connected Wi-Fi network entirely. Attackers can bombard the camera with a new SSID connect to, which knocks it off its network as it attempts to join the new one. The process takes about 90 seconds before the original Wi-Fi connection resets -- but if the attack is repeated on a loop, the security system is rendered useless.
Doyle told us these flaws aren't all that rare in the smart products that are coming to our homes as the Internet of Things (IoT) grows and evolves. "I've recently been interested in how IoT products were implementing the newer Bluetooth LE specification," he said via email. "I tested several home automation products, from cloud cameras like Google's Nest Cam to Bluetooth-enabled pressure cookers; and my results were a bit disconcerting."
He said some connected home products that use Bluetooth don't have much to offer in the security department at all -- but the Nest isn't the worst of them. "The Nest cam does have some well-thought-out security measures in place but their implementation obviously had a few shortcomings," he said.
Doyle also stressed that leaving Bluetooth on isn't the issue at hand here -- but it's important that makers of these connected devices lock those systems down.
"While leaving it on has functional advantages it also increases the attack surface and presents more options to an attacker," he said. "If they need it for some other integrations then it makes sense as long as they do their due diligence in securing the implementation."
A Nest rep acknowledged the existence of the flaws to us via email, but assured us a patch is on the way. "Nest is aware of this issue, developed a fix for it, and will roll it out to customers in the coming days," they said.
Until then, Nest owners would be smart to depend on the sturdiest old-school security systems their homes have to offer: a strong set of locks.
Topics Cybersecurity Google Cameras
(Editor: {typename type="name"/})
Lego free Valentine's Day Heart: How to get free Lego
Apple CEO Tim Cook gets lightly roasted by judge in 'Fortnite' trial
Bobcat rescued after being stuck in a car's grill for miles on Thanksgiving
China's Zhurong Mars rover sends back first images of the red planet
Best robot vacuums from CES 2025: Most are cool, only some are practical
Grad student created an amazing Rubik's Cube prototype for the blind
Nearly 1 in 2 Americans don't know what dating 'fetishization' means
Comedian finds photo of herself in art installation, unravels weird mystery on Twitter
Trump praises storm response as historic disaster unfolds in Houston
How to watch the 2021 NBA playoffs without cable
Trump's foreign aid freeze halts funding for digital diplomacy bureau
Perspiration is now festive thanks to a sweat
接受PR>=1、BR>=1,流量相当,内容相关类链接。