Default Credentials Vulnerability: The Case Study of Exposed IP Cams

Stefano Perone, L. Faramondi, R. Setola
{"title":"Default Credentials Vulnerability: The Case Study of Exposed IP Cams","authors":"Stefano Perone, L. Faramondi, R. Setola","doi":"10.1109/CSR57506.2023.10224944","DOIUrl":null,"url":null,"abstract":"The spread of IoT devices poses always major challenges to the issue of network security. In this paper, the study focus on the risks linked to the usage of default credentials in IoT devices, in particular, there is a focus on IP cameras. Many cameras on the Internet, in fact, use the manufacturer's default passwords and this makes it extremely easy to access them by a malicious actor. The importance of the problem should not be underestimated. Starting from an unauthorized access to the device, an attacker has access not only to images but also to a whole series of data that can be extrapolated and that can be used as a preliminary step for criminal actions. The risks of leaving credentials by default are closely related to the lack of attention during the design phase and the resulting vulnerabilities present in tools that do not respect the security-by-design standard; the producers, in fact, take often lightly this concept, leaving the whole task of ensure device security to the user. The main issue related to this vulnerability is the lack of legal protection; there are indeed a lot of tools that make available this open data to everyone without any possible legal restriction. In this paper we propose a practical study considering two case studies showing that the number of IP cam directly connected on Internet with default credential is incredible high. The first case focus on a cheap IP Cam model widely used in several contexts. The second one focus on an IP Cam model that corresponds to an high-end security camera intended purely for high-quality video surveillance and thermal imaging.","PeriodicalId":354918,"journal":{"name":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-07-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2023 IEEE International Conference on Cyber Security and Resilience (CSR)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSR57506.2023.10224944","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

The spread of IoT devices poses always major challenges to the issue of network security. In this paper, the study focus on the risks linked to the usage of default credentials in IoT devices, in particular, there is a focus on IP cameras. Many cameras on the Internet, in fact, use the manufacturer's default passwords and this makes it extremely easy to access them by a malicious actor. The importance of the problem should not be underestimated. Starting from an unauthorized access to the device, an attacker has access not only to images but also to a whole series of data that can be extrapolated and that can be used as a preliminary step for criminal actions. The risks of leaving credentials by default are closely related to the lack of attention during the design phase and the resulting vulnerabilities present in tools that do not respect the security-by-design standard; the producers, in fact, take often lightly this concept, leaving the whole task of ensure device security to the user. The main issue related to this vulnerability is the lack of legal protection; there are indeed a lot of tools that make available this open data to everyone without any possible legal restriction. In this paper we propose a practical study considering two case studies showing that the number of IP cam directly connected on Internet with default credential is incredible high. The first case focus on a cheap IP Cam model widely used in several contexts. The second one focus on an IP Cam model that corresponds to an high-end security camera intended purely for high-quality video surveillance and thermal imaging.
默认凭证漏洞:暴露的IP摄像头的案例研究
物联网设备的普及对网络安全问题提出了重大挑战。在本文中,研究重点关注与物联网设备中使用默认凭证相关的风险,特别是IP摄像机。事实上,互联网上的许多摄像头都使用制造商的默认密码,这使得恶意行为者非常容易访问它们。这个问题的重要性不应被低估。从未经授权访问设备开始,攻击者不仅可以访问图像,还可以访问可以推断的一系列数据,这些数据可以用作犯罪行为的初步步骤。默认保留凭证的风险与在设计阶段缺乏关注以及不遵守设计安全标准的工具中存在的由此导致的漏洞密切相关;事实上,生产商经常轻视这个概念,将确保设备安全的整个任务留给用户。与这一脆弱性有关的主要问题是缺乏法律保护;确实有很多工具可以在没有任何法律限制的情况下向每个人提供这些开放数据。在本文中,我们提出了一个实际的研究,结合两个案例,表明使用默认凭证直接连接到Internet的IP cam的数量非常高。第一个案例重点介绍了一种广泛应用于多种场合的廉价IP Cam模型。第二个重点是IP Cam模型,对应于纯粹用于高质量视频监控和热成像的高端安全摄像机。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信