4.9 • 696 Ratings
🗓️ 23 May 2023
⏱️ 5 minutes
🧾️ Download transcript
Click on a timestamp to play from that location
0:00.0 | Hello and welcome to the Tuesday, May 23rd, 2023 edition of the Sansonet Storm Sturt, Stormcast. |
0:08.7 | My name is Johannes Ulrich, and I am recording from Jacksonville, Florida. |
0:14.3 | Well, this morning I looked at our web honey pod logs and the one URL that I sort of spotted there looked kind of new and different. |
0:24.2 | Wireless underscore MFT was the name of the exploited script there. |
0:29.7 | So looked into it appears to be a relatively recent found vulnerability in Abis cameras. |
0:36.9 | You may be familiar with the brand name Abis from their locks, their reasonable, respected |
0:44.3 | padlock company. |
0:45.3 | And well, I didn't even know that they made security cameras. |
0:49.3 | Apparently, they actually don't really make them. |
0:53.3 | Digging into the vulnerability showed that this vulnerability is actually about, well, |
0:58.5 | not quite, but let's say 10 years old. |
1:01.6 | 2015 is when core security first released vulnerability in air life cameras. |
1:10.3 | Same URL, same command injection of vulnerability, |
1:15.6 | and that vulnerability kept coming back later in a couple of other cameras. What this really |
1:21.6 | shows us is that these cameras are made, of course, by fairly generic companies. They're then resold under |
1:29.8 | different brands and these resellers really either don't bother or really don't have the |
1:36.3 | expertise in order to figure out that they are vulnerable to all of these different issues |
1:43.3 | that have been discovered years and years |
1:46.4 | ago because they all share fundamentally the same software. Another thing to take from this is |
1:53.2 | if you are owning any kind of IoT device and these cameras are really just sort of one of the |
2:00.2 | popular examples of these IOT devices. |
2:03.4 | And you do see a vulnerability being published in a device that's somewhat functionally similar |
... |
Please login to see the full transcript.
Disclaimer: The podcast and artwork embedded on this page are from SANS ISC Handlers, and are the property of its owner and not affiliated with or endorsed by Tapesearch.
Generated transcripts are the property of SANS ISC Handlers and are distributed freely under the Fair Use doctrine. Transcripts generated by Tapesearch are not guaranteed to be accurate.
Copyright © Tapesearch 2025.