{"id":2828,"date":"2024-11-01T14:45:57","date_gmt":"2024-11-01T14:45:57","guid":{"rendered":"https:\/\/aegislens.com\/home\/?p=2828"},"modified":"2024-11-01T14:45:57","modified_gmt":"2024-11-01T14:45:57","slug":"uncovering-cyber-threats-hackers-exploit-zero-day-flaw-in-ptz-cameras","status":"publish","type":"post","link":"https:\/\/aegislens.com\/home\/uncovering-cyber-threats-hackers-exploit-zero-day-flaw-in-ptz-cameras\/","title":{"rendered":"Uncovering Cyber Threats: Hackers Exploit Zero-Day Flaw in PTZ Cameras"},"content":{"rendered":"<p>&#8220;`html<\/p>\n<h1>Hackers Target Critical Zero-Day Vulnerability in PTZ Cameras<\/h1>\n<p><strong>Summary:<\/strong> Cybercriminals are actively seeking to exploit two zero-day vulnerabilities discovered in PTZOptics pan-tilt-zoom (PTZ) live streaming cameras, widely utilized in industrial, healthcare, business conferences, government, and courtroom environments.<\/p>\n<h2>Introduction<\/h2>\n<p>Two critical zero-day vulnerabilities with a perfect 10 CVSS (Common Vulnerability Scoring System) score have been identified in PTZ cameras manufactured by PTZOptics.<\/p>\n<p>The vulnerabilities, tracked under CVE-2021-28372 and CVE-2021-28373, could allow remote attackers to take over the affected devices completely.<\/p>\n<h2>The Vulnerabilities Explained<\/h2>\n<p>The first vulnerability, CVE-2021-28372, is a pre-authentication command injection flaw in the web server of the camera that could enable hackers to control remote actions.<\/p>\n<p>By sending specially-crafted HTTP requests, a hacker can inject arbitrary commands into the web interface of the cameras without needing a valid login. <\/p>\n<p>The second vulnerability, CVE-2021-28373, is a path traversal flaw that allows a hacker to read arbitrary files on the device.<\/p>\n<p>By manipulating file paths in requests to the web server, a malicious actor can gain access to confidential information, potentially leading to further exploitations.<\/p>\n<h2>The Widespread Impact<\/h2>\n<p>PTZ cameras affected by these vulnerabilities are extensively utilized around the globe.<\/p>\n<p>This makes the potential risk severe and far-reaching, affecting a multitude of industries including industrial complexes, healthcare providers, professional conference settings, governmental buildings, and courtroom settings.<\/p>\n<h2>Real-world Examples<\/h2>\n<p>In 2020, amidst the COVID-19 pandemic when reliance on video conferencing and remote communication technologies increased, hackers targeted similar vulnerabilities in Zoom video software, affecting millions of users worldwide.<\/p>\n<p>The incident underscored the growing significance of camera security. <\/p>\n<h2>What should you do?<\/h2>\n<p>While PTZOptics has not yet released a security patch, users should follow standard cybersecurity protocols to mitigate the risk.<\/p>\n<p>Isolate the cameras from the network, use complex login credentials, disable remote access when not needed, and follow basic cybersecurity hygiene.<\/p>\n<p>Ensure strict monitoring to detect any suspicious activities.<\/p>\n<p>Beyond these steps, professionals should alert their cybersecurity teams and IT departments about these vulnerabilities and take necessary mitigation actions promptly.<\/p>\n<h3>Follow-Up Reading<\/h3>\n<ul>\n<li><a href=\"https:\/\/www.cybersecurity-insiders.com\/hacking-ptz-cameras-how-and-why\/\" target=\"blank\" rel=\"noopener\"> Hacking PTZ Cameras: How and Why &#8211; Cybersecurity Insiders<\/a><\/li>\n<li><a href=\"https:\/\/www.darkreading.com\/vulnerabilities-threats\/perfect-10-cvss-score-given-to-critical-cybersecurity-vulnerabilities\/d\/d-id\/1337923\" target=\"blank\" rel=\"noopener\"> Perfect 10 CVSS Score Given To Critical Cybersecurity Vulnerabilities &#8211; Dark Reading<\/a><\/li>\n<li><a href=\"https:\/\/www.cyber.gov.au\/acsc\/view-all-content\/alerts\/critical-vulnerabilities-many-vpn-appliances\" target=\"blank\" rel=\"noopener\"> Critical vulnerabilities in many VPN Systems &#8211; Cyber.gov.au <\/a><\/li>\n<\/ul>\n<p>&#8220;`<br \/>\n<\/html><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;`html Hackers Target Critical Zero-Day Vulnerability in PTZ Cameras Summary: Cybercriminals are actively seeking to<\/p>\n","protected":false},"author":1,"featured_media":2829,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"pmpro_default_level":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[2,5],"tags":[],"class_list":["post-2828","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","category-news","pmpro-has-access"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2828","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/comments?post=2828"}],"version-history":[{"count":1,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2828\/revisions"}],"predecessor-version":[{"id":2830,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/posts\/2828\/revisions\/2830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media\/2829"}],"wp:attachment":[{"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/media?parent=2828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/categories?post=2828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aegislens.com\/home\/wp-json\/wp\/v2\/tags?post=2828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}