Your Web News in One Place

Help Webnuz

Referal links:

Sign up for GreenGeeks web hosting
December 17, 2019 08:48 pm PST

Idiotic security mistakes in smart conferencing gear allows hackers to spy on board rooms, steal presentations

Dten is a "certified hardware provider" for Zoom, making smart screens and whiteboards for videoconferencing; a Forescout Research report reveals that Dten committed a string of idiotic security blunders in designing its products, exposing its customers to video and audio surveillance, as well as theft of presentations and whiteboard data.

Among the mistakes Forescout identified:

* Storing customer data in unsecured Amazon web buckets; all you needed to do to spy on a customer's stored data was to change the customer ID in the standard URL provided to each customer;

* Not using SSL to encrypt data in transit, making it trivial to eavesdrop on conferences

Forescout identified five bugs in July. As of today, Dten has fixed three of them.

Dten told Wired: "We take customer privacy and security very seriously."

The researchers also discovered two ways that an attacker on the same network as DTEN devices could manipulate the video conferencing units to monitor all video and audio feeds and, in one case, to take full control. DTEN hardware runs Android primarily, but uses Microsoft Windows for Zoom. The researchers found that they can access a development tool known as "Android Debug Bridge," either wirelessly or through USB ports or ethernet, to take over a unit. The other bug also relates to exposed Android factory settings. The researchers note that attempting to implement both operating systems creates more opportunities for misconfigurations and exposure. DTEN says that it will push patches for both bugs by the end of the year.

Read the rest


Original Link: http://feeds.boingboing.net/~r/boingboing/iBag/~3/EfPWt2H9EBE/no-ssl.html

Share this article:    Share on Facebook
View Full Article