Google Nest Security Cam Bugs Allow Device Takeover

Eight vulnerabilities would allow a range of attacker activities, including taking the Nest camera offline, sniffing out network information and device hijacking. Multiple vulnerabilities in Google’s Nest Cam IQ connected indoor security camera would allow an attacker on the same network to take over the device, execute code on it and/or take it offline. Nest Labs’ Cam IQ Indoor integrates security-enhanced Linux in Android, Google Assistant and facial recognition all into a compact security camera, according to Cisco Talos, whose Lilith Wyatt and Claudio Bozzato discovered the bugs. “It primarily uses the Weave protocol for setup and initial communications with other Nest devices over TCP, UDP, Bluetooth and 6lowpan,” they explained in a Monday write-up. “Most of these vulnerabilities lie in the weave binary of the camera, however, there are some that also apply to the weave-tool binary.” There are eight vulnerabilities total; three of them are denial-of-service (DoS) bugs that an attacker could use to disable the camera; two would allow code execution; and the other three could be used for information disclosure.

Spotlight

Other News

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More

Dom Nicastro | April 03, 2020

Read More