SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access And Monitoring For Data Centers

    KentixONE – IoT Access And Monitoring For Data Centers

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Photovoltaic Systems: Risks And Fire Detection
    • Acoem Gunshot Detection: Protecting Critical Infrastructure
    • ZeroEyes Expands AI Gun Detection At Ki Charter
    • DHF's 2025 Achievements In Door And Hardware Industry
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    Featured
    • Why Open Matters In The Age Of AI
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

    Munich Security Conference (MSC) 2026

    Munich Security Conference (MSC) 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6
Video surveillance
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

Bitdefender Report: 175,000 Internet Of Things Connected Security Cameras Vulnerable To Cyber Attacks

7 Aug 2017

Bitdefender Report: 175,000 Internet Of Things Connected Security Cameras Vulnerable To Cyber Attacks
icon Add as a preferred source Download PDF version
Related Links
  • Internet Of Things (IoT) Impacts Video Surveillance And Security Sector

Some 175,000 Internet of Things (IoT) connected security cameras are vulnerable to hacks that would allow cybercriminals to enter a user's network, spy on the owner, or become part of a malicious botnet, according to a new report from security provider Bitdefender.

Buffer Overflow Vulnerabilities

The cameras are manufactured by Shenzhen Neo Electronics, a Chinese company that provides surveillance and security solutions such as sensors, alarms, and IP cameras. Researchers found several buffer overflow vulnerabilities present in two cameras studied: The iDoorbell model, and the NIP-22 model. However, it's likely that all cameras sold by the company use the same software, and are also vulnerable, the report noted.

"These vulnerabilities could allow, under certain conditions, remote code execution on the device," the report stated. "This type of vulnerability is also present on the gateway which controls the sensors and alarms." This could allow hackers to potentially disable alarms or sensors as well.

Universal Plug and Play (UPnP)

The cameras use Universal Plug and Play (UPnP) to open ports on the router, so they can be accessed from the outside world, the report stated. Using the Shodan search engine, researchers could find all cameras discoverable on the internet. They found between 100,000 and 140,000 devices when searching for the HTTP web server, and a similar number when searching for the RTSP server—both of which are vulnerable. However, researchers estimate the actual number of unique, at-risk devices is about 175,000. Researchers were able to compromise the vendor's IPTV and gateway products by remote exploitation that is easy to do due to the devices' use of UPnP.

In 2016, Bitdefender security researchers also detected multiple vulnerabilities in a number of IoT devices, including WeMo switches, LinkHub, LIFX Bulb, and the MUZO Cobblestone audio receiver.

Gartner predicts that 2017 will see 8.4 billion connected devices in use worldwide—more than the number of humans on the planet

"This proof of concept attack confirms once again that most Internet of Things devices are trivial to exploit because of improper quality assurance at the firmware level," the report stated. "Paired with the fact that the bug affects the authentication mechanism (i.e. it does not require the user to already be authenticated to exploit the flaw) and the massive pool of affected devices, we can only imagine the impact a harvested botnet of devices might have."

Flaws In IoT Security

IoT is growing in nearly every sector, from consumers to home automation to industry. Gartner predicts that 2017 will see 8.4 billion connected devices in use worldwide—more than the number of humans on the planet.

Yet IoT manufacturers constantly overlook security in most devices that land on the market, either due to the extra costs and expertise required to build in security measures, or because of the device's CPU power and battery constraints, the report stated. This creates many security loopholes and backdoors, which are especially problematic in security cameras, which can be used to enter the user's network, or for spying on their owners.

Security experts predict a rise in IoT security breaches this year, making it extremely important for manufacturers to ensure devices are secure, and for enterprise and consumer users to have proper security protocols in place.

"If not taken care of, the weak state of IoT security increases the number of vulnerabilities and attack vectors which could soon massively affect users' privacy and personal life," the report concluded

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote video surveillance
  • IP video surveillance
  • Security cameras
  • Security software
  • Research & Testing
  • Cyber security
  • Crime prevention
  • Internet of Things (IoT)
  • Home automation
  • Video surveillance
  • Related categories
  • Surveillance cameras
  • IP cameras
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
Related articles
Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft

Louvre Heist Exposes Security Gaps: How Smarter Security Could Have Prevented A $100 Million Theft

HikCentral Lite V1.1.2: Streamlined SMB Security

HikCentral Lite V1.1.2: Streamlined SMB Security

Unlocking AVS: A Standard In Alarm Monitoring

Unlocking AVS: A Standard In Alarm Monitoring

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video surveillance
  4. News
  5. Corporate news

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec