Affected: Dropcam, Dropcam Pro, Nest Cam Indoor/Outdoor models
Lamen: Attackers can disable your cameras wirelessly, even if wired.. they can force the device to reboot endlessly via Bluetooth
Google-Nest-Cam-Bug-Disclosures/README.md at master · jasondoyle/Google-Nest-Cam-Bug-Disclosures · GitHub
Reported in October of last year; disclosed this week.. still no fix.
Today's Lesson: Security and Wireless do not mix.. we already knew NestCam's suck.
Summary
It's possible to trigger a buffer overflow condition when setting the SSID parameter on the camera. The attacker must be in bluetooth range at any time during the cameras powered on state. Bluetooth is never disabled even after initial setup.
Lamen: Attackers can disable your cameras wirelessly, even if wired.. they can force the device to reboot endlessly via Bluetooth
Google-Nest-Cam-Bug-Disclosures/README.md at master · jasondoyle/Google-Nest-Cam-Bug-Disclosures · GitHub
Reported in October of last year; disclosed this week.. still no fix.
Today's Lesson: Security and Wireless do not mix.. we already knew NestCam's suck.
Last edited: