Mass P2P Video Surveillance Vulnerability Impacts Millions (ThroughTek)

By Sean Patton, Published Jun 21, 2021, 08:40am EDT (Info+)

P2P has become a major alternative to the insecurity of port forwarding but one of the most widely used providers (Throughtek, whose customers have included Swann, Foscam, Wyze, and many more) has been found to have a massive vulnerability in its widely used SDK.

IPVM Image

In this report, we explain the vulnerability, what companies use its P2P platform, examine the impact, how the vulnerability is fixed, including feedback from Throughtek.

Attack *******

*** ************* ****** ********* ** ******** access ***** *** ***** **** *** Internet, **** * **********-******* *** ** camera. ** *** ***** ** **********'* SDK (********* *** *** ******** ** to *** ********* ******* *.*.*.), ***** prior ** *********, *** *** ******* encrypted ************** ******* ****** ******* (*.*. NVRs, *******) *** ********** *** ******* servers.

******** ******** ******* **************** *** ************* ***** ** * basic *****-***** ******* ****** ********** ******** that ******** ******* *** *******:

IPVM Image

******* *** *** *** ********** ** use * ***** ***, ****** **** a ******** ****** *** ********, ****** noted:

***** **** ******* ********* *** ********, an ******** **** ** **** ** access ** *** *********** *** *****/***** stream.

*** ********* ** * *****-**-******* ****** we *********, ***** ************ **-***-*** ******* from *** ******* *******. *** ****** starting **** **** ** *** *** that ******** ********** * ****** ** the *** *******.

IPVM Image

****** **** ***** **** ***** ** attacker *** *** ** ****** *** traffic ** ********** *******, ******* ******* that *** *** ******* *** *** a ****** *** ********, *********** ***** devices *** ********** ******** ** ***** step.

*******, **** ******** ********** ** ******* against ***** *** ********, ******:

******* ******* * ****** ******* *** newer ******* ** *** ******** ****** to ** * ****** ********* **** finding *** *************.

Impacts ******** ** *******

**********'****** *.*** ******** ** * ******** ********* for ***+ **** **** **+ ************* (such ** ***** ** ********* ** Ambarella) **** *** **** ** *** IoT *** ************ **********, ********* ************, home **********, ***** ****, *** ***** retail.

********** ********* **** ******* ******* ******** include ******, *****, *** ****. ********** also ****** **** ***** ********, *****, Guardzilla, *********, **, *****, ***** ***, HP, *******, ********, *******, ******, *** current ** **** *********, **** ******** ** ****. *********** ***** ** ***** *********' production *********** *** ********** ** ********* and *******.

** ***** **** ** **** **** ever, ** ***** ***** * ********** version ** ********** ***, *** **** did *** *******. ** **** ****** the ****** ** **** **.

Encryption *******, *** ********

*** ******* ********* ********* ** * connector ****** *** ****** ******** **** they ***** ******** ******** ****** ** end ** *** ********** *** *****-****** authentication:

IPVM Image

*******, **** ***** **** ********** *** not ******* *** *** ** ********** of *** *********, ***** ****** *** vulnerability. **** **** **** **** ******** education *** ********* ** *** ***** system ** * **** ****** ******:

** * *** ******** ********, ** continuously ********* ********** ******** *** ***** service ** ******* ****** ******** ********* to ***** ** *******, **********, *** client ***. ******** ** ****** ***** what ***/******** **** ********** **** *** in *** ***, **** **** ******** our *********** ******** *** **** **** our ********* *** ** ********* ** avoid ******* ******** ******.

SDK / ******** ****** ********

*** ********* *** ********** *** *** customers ** ******** ** ******* **** firmware *******, ***** ********** *********** *** those ******* **** ****** ** ******* remotely ****-***-***.

** ****, ******** ******** *** ******** to ****** ** * ****** ******* due ** *** ****** ** *** consumers ** ***** ***-**** *******; **** do *** ******** ******* *********, *** typically ***/****** ******* **** ******* ********* of ************* ******.

Critical ************* *******

****************** ** ********** *** *********** ********* the ************* ** ********** ** ***** 2021. *** ************* ** ********* ****** on ***** *** ******* ******* ******** details:***-****-*****.

*** ************* *** ***** * **** v3 **** ***** ** *.* *** to *** **** ** ****** ** live/recorded ***** *** *****, ****** *************, the *** ********** ** *** ******, and ** *********** ** ******** ********. The **** ****** ****** ** (**:*/**:*/**:*/**:*/*:*/*:*/*:*/*:*).

IPVM Image

**** ** * ****** ******, ******* to *************** **** *******'* ********* ************* ************ ************* **** **** ******* ****** ****/*********** knowledge ** ******.

ThroughTek ********

IPVM Image

****** ***** ******* ***,************* *********** ** ****** ** ****. They *** * ***** ********** ******** in *** ***/***** ****** *** ***** surveillance **********. ** ****, **** ******** the ***** ********, ***** ** ******* to **** *************.

********** ** * ******** *******, ** such, **** ** *** ******* ******** devices *** **** **** ******** ************* and ****/********** ** ********* ******** ******** of ******** *** ******** ***********.

ThroughTek ****** *********

**********'************* ** *** ********************* **** **** ********* **** ** fault *** *********** ***** *** ***, or ****** ** ****** *******:

******** ********** **., ***. (*********** ******** to ** ****) *** ********** **** customers *** *********** *********** *** *** or **** *********** *** *** ******* updates.

***** ********** ** ********** ************** *** the *************, **** ******* *** ****** to ********* *** *** ** ** unsecured ******, ***** ***** ********* *** because ** *** ******/****** **** ******** for ******* *******.

********** **** **** **** **** ********* customers ** ******* *** ***, *** older ******** ** *** ******* ****-***-*** or ****** ****-***-******** ********:

*** *** **** ***** *****, ** have **** ********* *** ********* ** upgrade ***** ***. **** *** ******* lack *** ******** ***** ***** *** FW ******* **********. ** ********, ** have ********* **** ***’* **** ** enable *** **** ******* ** ***** slow **** *** ********** ************* *****, therefore *** ******** ** *******. **** provides *** **** ********* ***** *** API *** ******* ***********, ** ** not ****** *** ******** *** ********* for ** **********

ThroughTek ***** ***** **** ****

***** ********** *** *** ******** ******** the ************* ***** ** *** *********** forced ** *** **** *** ****** announcements, **** ****** ****** **** ****** ***** **, ****, *********** ********* to ****** ******* *** **** ******** features, *** ** ***** ***:

*** ******* ********* ******** ******* ***** of *** ********** **********. ***** ******** the ******* *********, *** *** ******* will **** ** ***** ******* **** peer ** * ********** ******** *** same ******* ****** **** *** *** up * **********. ** ******** ****, data ******** **** ** ********. ** encourage *** ********* ** ********* ******* and ****. ** *** **** ****, please **** **** ** ******* **** sales ***************.

** **** *****, ********* ** ******, ThroughTek *** ***** ** *** *****.

Nozomi ********

****** *** *********** ** ********** ** 2013, ** **-*********** ****** ************* ****** *******, **** **** ****** *********** ** software *** ******** **** ********. ****** offers ************* ******** *** ********** ******** and ******* *** ************* *** *****, and ****** ******* ****** *********.

************, **** ******* ****** ******* ****, which ***** *** ********** *************, *********** * ******* *** ****** *************. **** ****** **** ***** *** receives ******* *** ****** **********:

** ****** ******** ** **** * continuous ******** ** ******* **** ***** our *** ***********, **** *** ** IoT ** ******* *******. **** ** receive * *** ******, *** ** the ***** ********** ** ** ** analyze *** ******* *******.

Comments (3)

** **** ** *********** ** *** if **** **** **** *******. ***** is ******* ***** **** * ******* not ********** ****** **** ** ******** the ******** ** ***** ********.

* **** ********** **** * ******* needs ** ******* * ********* *** investigate *** ***** ******* ** **** speaking *** *** **** *** ******* out ********* ***********.

Agree: 1
Disagree
Informative
Unhelpful
Funny
Agree
Disagree
Informative: 2
Unhelpful
Funny

****, **** ** * ********* *** to ******* ******* *** **** * valid *** ** *******.

** ****** ******:

** *******, *** ***** **** *** access *** ******* ******* ******* *** NVR *** *** *** ****, ********* the *** *****-***** ****** ******** ** some *********, ***** ****** *** **** confidential *****/***** *******.

** *** **** * *** ** sniff ***** ***** ******* ** * non-public ******* ** *** * ***.

*** **** ** * *** *** from *** ********* ***** ****-***** ********, which ******* ****** **** ******** ** discover * ****** *** **** ******* it ********.

Agree
Disagree: 1
Informative
Unhelpful
Funny
Login to read this IPVM report.
Why do I need to log in?
IPVM conducts reporting, tutorials and software funded by subscriber's payments enabling us to offer the most independent, accurate and in-depth information.
Loading Related Reports