ATENTIONโผ New - CVE-2017-8227
๐ Read
via "National Vulnerability Database".
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have a timeout policy to wait for 5 minutes in case 30 incorrect password attempts are detected using the Web and HTTP API interface provided by the device. However, if the same brute force attempt is performed using the ONVIF specification (which is supported by the same binary) then there is no account lockout or timeout executed. This can allow an attacker to circumvent the account protection mechanism and brute force the credentials. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that performs the credential check in the binary for the ONVIF specification. If one opens this binary in IDA-pro one will notice that this follows a ARM little endian format. The function at address 00671618 in IDA pro is parses the WSSE security token header. The sub_ 603D8 then performs the authentication check and if it is incorrect passes to the function sub_59F4C which prints the value "Sender not authorized."๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2017-8226
๐ Read
via "National Vulnerability Database".
Amcrest IPM-721S V2.420.AC00.16.R.20160909 devices have default credentials that are hardcoded in the firmware and can be extracted by anyone who reverses the firmware to identify them. If the firmware version V2.420.AC00.16.R 9/9/2016 is dissected using binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that sets up the default credentials on the device. If one opens this binary in IDA-pro, one will notice that this follows a ARM little endian format. The function sub_3DB2FC in IDA pro is identified to be setting up the values at address 0x003DB5A6. The sub_5C057C then sets this value and adds it to the Configuration files in /mnt/mtd/Config/Account1 file.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2017-13719
๐ Read
via "National Vulnerability Database".
The Amcrest IPM-721S Amcrest_IPC-AWXX_Eng_N_V2.420.AC00.17.R.20170322 allows HTTP requests that permit enabling various functionalities of the camera by using HTTP APIs, instead of the web management interface that is provided by the application. This HTTP API receives the credentials as base64 encoded in the Authorization HTTP header. However, a missing length check in the code allows an attacker to send a string of 1024 characters in the password field, and allows an attacker to exploit a memory corruption issue. This can allow an attacker to circumvent the account protection mechanism and brute force the credentials. If the firmware version Amcrest_IPC-AWXX_Eng_N_V2.420.AC00.17.R.20170322 is dissected using the binwalk tool, one obtains a _user-x.squashfs.img.extracted archive which contains the filesystem set up on the device that has many of the binaries in the /usr folder. The binary "sonia" is the one that has the vulnerable function that performs the credential check in the binary for the HTTP API specification. If we open this binary in IDA Pro we will notice that this follows an ARM little-endian format. The function at address 00415364 in IDA Pro starts the HTTP authentication process. This function calls another function at sub_ 0042CCA0 at address 0041549C. This function performs a strchr operation after base64 decoding the credentials, and stores the result on the stack, which results in a stack-based buffer overflow.๐ Read
via "National Vulnerability Database".
ATENTIONโผ New - CVE-2015-3907
๐ Read
via "National Vulnerability Database".
CodeIgniter Rest Server (aka codeigniter-restserver) 2.7.1 allows XXE attacks.๐ Read
via "National Vulnerability Database".
๐ด D-Link Agrees to Strengthen Device Security ๐ด
๐ Read
via "Dark Reading: ".
A settlement with the FTC should mean comprehensive security upgrades for D-Link routers and IP camera.๐ Read
via "Dark Reading: ".
Dark Reading
D-Link Agrees to Strengthen Device Security
A settlement with the FTC should mean comprehensive security upgrades for D-Link routers and IP camera.
โ TikTok investigated (again) over how it handles childrenโs data and safety โ
๐ Read
via "Naked Security".
It's already gotten hit with the biggest-ever US child privacy fine, and now it might be facing a fine for GDPR violations.๐ Read
via "Naked Security".
Naked Security
TikTok investigated (again) over how it handles childrenโs data and safety
Itโs already gotten hit with the biggest-ever US child privacy fine, and now it might be facing a fine for GDPR violations.
โ Facebook should put a stop to Libra for now, says Congress โ
๐ Read
via "Naked Security".
Could Facebook's Libra cryptocurrency undermine the security of the global financial ecosystem?๐ Read
via "Naked Security".
Naked Security
Facebook should put a stop to Libra for now, says Congress
Could Facebookโs Libra cryptocurrency undermine the security of the global financial ecosystem?
โ Facebookโs down-ranking those โmiracle cureโ health posts we all hate โ
๐ Read
via "Naked Security".
Clickbait health/nutrition posts will sink in page rankings due to two ranking updates, Facebook announced.๐ Read
via "Naked Security".
Naked Security
Facebookโs down-ranking those โmiracle cureโ health posts we all hate
Clickbait health/nutrition posts will sink in page rankings due to two ranking updates, Facebook announced.
โ Open Sesame! Zipatoโs smart hub hacked to open front doors โ
๐ Read
via "Naked Security".
The Zipato controller has three critical security flaws which could be used together by hackers to open your homeโs doors for you, according to researchers.๐ Read
via "Naked Security".
Naked Security
Open Sesame! Zipatoโs smart hub hacked to open front doors
The Zipato controller has three critical security flaws which could be used together by hackers to open your homeโs doors for you, according to researchers.
โ Why are they โsmartโ locks if more money buys you less security? โ
๐ Read
via "Naked Security".
Smart locks are cool and useful - but they are also a great reminder that cybersecurity is all about value, not cost.๐ Read
via "Naked Security".
Naked Security
Why are they โsmartโ locks if more money buys you less security?
Smart locks are cool and useful โ but they are also a great reminder that cybersecurity is all about value, not cost.
โ Deepfake revenge porn now a crime in Virginia โ
๐ Read
via "Naked Security".
It's the first state to enact a deepfakes ban, but it's not going to be the last: laws are being considered in many other states.๐ Read
via "Naked Security".
Naked Security
Deepfake revenge porn now a crime in Virginia
Itโs the first state to enact a deepfakes ban, but itโs not going to be the last: laws are being considered in many other states.
โ Mannequin Challenge videos teach computers to see โ
๐ Read
via "Naked Security".
An internet craze could change the way computers see, thanks to research published by Google.๐ Read
via "Naked Security".
Naked Security
Mannequin Challenge videos teach computers to see
An internet craze could change the way computers see, thanks to research published by Google.
โ Bitcoin eats as much energy as Switzerland โ
๐ Read
via "Naked Security".
That's around seven gigawatts, equal to 0.21% of the world's supply: as much power as generated by seven Dungeness nuclear power plants.๐ Read
via "Naked Security".
Naked Security
Bitcoin eats as much energy as Switzerland
Thatโs around seven gigawatts, equal to 0.21% of the worldโs supply: as much power as generated by seven Dungeness nuclear power plants.
โ OpenPGP experts targeted by long-feared โpoisoningโ attack โ
๐ Read
via "Naked Security".
Somebody out there has taken a big dislike to Robert J. Hansen (โrjhโ) and Daniel Kahn Gillmor (โdkgโ), two well-regarded experts in the specialised world of OpenPGP email encryption.๐ Read
via "Naked Security".
Naked Security
OpenPGP experts targeted by long-feared โpoisoningโ attack
Somebody out there has taken a big dislike to Robert J. Hansen (โrjhโ) and Daniel Kahn Gillmor (โdkgโ), two well-regarded experts in the specialised world of OpenPGP email encryption.
๐ Friday Five: 7/5 Edition ๐
๐ Read
via "Subscriber Blog RSS Feed ".
Cracking a five year Facebook malware campaign, this week's CDN outage, and an app fined for leaking users' photos - catch up on the week's news with this recap!๐ Read
via "Subscriber Blog RSS Feed ".
Digital Guardian
Friday Five: 7/5 Edition
Cracking a five year Facebook malware campaign, this week's CDN outage, and an app fined for leaking users' photos - catch up on the week's news with this recap!
๐ด Why Your GDPR Implementation Plan Needs CISOs & 'Legal Engineers' to Work Together ๐ด
๐ Read
via "Dark Reading: ".
Lawyers must step into the shoes of technical roles and craft legal guidance that can be easily put into use.๐ Read
via "Dark Reading: ".
Dark Reading
Dark Reading | Security | Protect The Business - Enable Access
Cyber security's comprehensive news site is now an online community for security professionals, outlining cyber threats and the technologies for defending against them.
โ 5 tips to stay secure on social media โ
๐ Read
via "Naked Security".
Social media isn't for everyone, but lots of us love it - so here's how to be in it and win it.๐ Read
via "Naked Security".
Naked Security
5 tips to stay secure on social media
Social media isnโt for everyone, but lots of us love it โ so hereโs how to be in it and win it.
โ PGP Ecosystem Targeted in โPoisoningโ Attacks โ
๐ Read
via "Threatpost".
Two researchers are being singled out in what are called PGP poisoning or flood attacks that render the authentication tool unusable for victims.๐ Read
via "Threatpost".
Threat Post
PGP Ecosystem Targeted in โPoisoningโ Attacks
Two researchers are being singled out in what are called PGP poising or flood attacks that render the authentication tool unusable for victims.
๐ด Intelligent Authentication Market Grows to Meet Demand ๐ด
๐ Read
via "Dark Reading: ".
Confidence in user identity is critical to prevent fraud and theft, and companies are looking for new ways to get the necessary assurance.๐ Read
via "Dark Reading: ".
Darkreading
Intelligent Authentication Market Grows to Meet Demand
Confidence in user identity is critical to prevent fraud and theft, and companies are looking for new ways to get the necessary assurance.
โ WordPress Plugin WP Statistics Patches XSS Flaw โ
๐ Read
via "Threatpost".
A cross-site scripting vulnerability in WordPress plugin WP Statistics could have enabled full website takeover.๐ Read
via "Threatpost".
Threat Post
WordPress Plugin WP Statistics Patches XSS Flaw
A cross-site scripting vulnerability in WordPress plugin WP Statistics could have enabled full website takeover.
๐ด UK Forensics Firm Paid Ransom in Cyberattack ๐ด
๐ Read
via "Dark Reading: ".
Victim firm Eurofins Scientific handles more than 70,000 criminal cases per year in the UK.๐ Read
via "Dark Reading: ".
Dark Reading
Cyberattacks & Data Breaches recent news | Dark Reading
Explore the latest news and expert commentary on Cyberattacks & Data Breaches, brought to you by the editors of Dark Reading