Remotely Exploitable Flaw Puts Millions of Internet-Connected Devices at Risk


Security researchers have discovered a critical remotely exploitable vulnerability in an open-source software development library used by major manufacturers of the Internet-of-Thing devices that eventually left millions of devices vulnerable to hacking.

The vulnerability (CVE-2017-9765),

discovered

by researchers at the IoT-focused security firm Senrio, resides in the software development library called

gSOAP toolkit

(Simple Object Access Protocol) — an advanced C/C++ auto-coding tool for developing XML Web services and XML application.

Dubbed "

Devil's Ivy

," the stack buffer overflow vulnerability allows a remote attacker to crash the SOAP WebServices daemon and could be exploited to execute arbitrary code on the vulnerable devices.

The Devil's Ivy vulnerability was discovered by researchers while analysing an Internet-connected security camera manufactured by Axis Communications.

"When exploited, it allows an attacker to remotely access a video feed or deny the owner access to the feed," researchers say. 
"Since these cameras are meant to secure something, like a bank lobby, this could lead to collection of sensitive information or prevent a crime from being observed or recorded."

Axis confirmed the vulnerability that exists in almost all of its 250 camera models (you can find the complete

list of affected camera models

here) and has quickly released patched firmware updates on July 6th to address the vulnerability, prompting partners and customers to upgrade as soon as possible.

However, researchers believe that their exploit would work on internet-connected devices from other vendors as well, as the affected software is used by Canon, Siemens, Cisco, Hitachi, and many others.

Axis immediately informed Genivia, the company that maintains gSOAP, about the vulnerability and Genivia

released a patch

on June 21, 2017.

The company also reached out to electronics industry consortium

ONVIF

to ensure all of its members, including Canon, Cisco, and Siemens, those who make use of gSOAP become aware of the issue and can develop patches to fix the security hole.



from The Hacker News http://ift.tt/2vyNb3U