{"id":123874,"date":"2021-06-16T09:22:55","date_gmt":"2021-06-16T16:22:55","guid":{"rendered":"https:\/\/lifeboat.com\/blog\/2021\/06\/millions-of-connected-cameras-open-to-eavesdropping"},"modified":"2021-06-16T09:22:55","modified_gmt":"2021-06-16T16:22:55","slug":"millions-of-connected-cameras-open-to-eavesdropping","status":"publish","type":"post","link":"https:\/\/lifeboat.com\/blog\/2021\/06\/millions-of-connected-cameras-open-to-eavesdropping","title":{"rendered":"Millions of Connected Cameras Open to Eavesdropping"},"content":{"rendered":"<p><a class=\"aligncenter blog-photo\" href=\"https:\/\/lifeboat.com\/blog.images\/millions-of-connected-cameras-open-to-eavesdropping.jpg\"><\/a><\/p>\n<p>A supply-chain component lays open camera feeds to remote attackers thanks to a critical security vulnerability.<\/p>\n<p>Millions of connected security and home cameras contain a critical software vulnerability that can allow remote attackers to tap into video feeds, according to a warning from the Cybersecurity and Infrastructure Security Agency (CISA).<\/p>\n<p>The bug (<a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-32934\" target=\"_blank\" rel=\"noopener\">CVE-2021\u201332934<\/a>, with a CVSS v3 base score of 9.1) has been introduced via a supply-chain component from ThroughTek that\u2019s used by several original equipment manufacturers (OEMs) of security cameras \u2013 along with makers of IoT devices like baby-and pet-monitoring cameras, and robotic and battery devices.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A supply-chain component lays open camera feeds to remote attackers thanks to a critical security vulnerability. Millions of connected security and home cameras contain a critical software vulnerability that can allow remote attackers to tap into video feeds, according to a warning from the Cybersecurity and Infrastructure Security Agency (CISA). The bug (CVE-2021\u201332934, with a [\u2026]<\/p>\n","protected":false},"author":396,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[34,15,6],"tags":[],"class_list":["post-123874","post","type-post","status-publish","format-standard","hentry","category-cybercrime-malcode","category-habitats","category-robotics-ai"],"_links":{"self":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/123874","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/users\/396"}],"replies":[{"embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/comments?post=123874"}],"version-history":[{"count":0,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/posts\/123874\/revisions"}],"wp:attachment":[{"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/media?parent=123874"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/categories?post=123874"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lifeboat.com\/blog\/wp-json\/wp\/v2\/tags?post=123874"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}