Article 62NAM Ring patched an Android bug that could have exposed video footage

Ring patched an Android bug that could have exposed video footage

by
Kevin Purdy
from Ars Technica - All content on (#62NAM)
20201118_US_packaging_image_lifestyle_fl

Enlarge / Ring camera images give you a view of what's happening and, in one security firm's experiments, a good base for machine learning surveillance. (credit: Ring)

Amazon quietly but quickly patched a vulnerability in its Ring app that could have exposed users' camera recordings and other data, according to security firm Checkmarx.

Checkmarx researchers write in a blog post that Ring's Android app, downloaded more than 10 million times, made an activity available to all other applications on Android devices. Ring's com.ring.nh.deeplink.DeepLinkActivity would execute any web content given to it, so long as the address included the text /better-neighborhoods/.

That alone would not have granted access to Ring data, but Checkmarx was able to use a cross-site scripting vulnerability in Ring's internal browser to point it at an authorization token. Next, Checkmarx obtained a session cookie by authorizing that token and its hardware identifier at a Ring endpoint and then used Ring's APIs to extract names, email addresses, phone numbers, Ring device data (including geolocation), and saved recordings.

Read 5 remaining paragraphs | Comments

External Content
Source RSS or Atom Feed
Feed Location http://feeds.arstechnica.com/arstechnica/index
Feed Title Ars Technica - All content
Feed Link https://arstechnica.com/
Reply 0 comments