This nasty Amazon Ring vulnerability could have exposed all your recordings

The Android app of Ring , the Amazon-owned firm that offers doorbells and indoor and outdoor surveillance cameras, had a vulnerability that...

The Android app of Ring, the Amazon-owned firm that offers doorbells and indoor and outdoor surveillance cameras, had a vulnerability that could have allowed threat actors to steal identity data including geolocation and camera recordings. 

Cybersecurity researchers from Checkmarx found the vulnerability in the com.ringapp/com.ring.nh.deeplink.DeepLinkActivity activity, noting that this was, "implicitly exported in the Android Manifest and, as such, was accessible to other applications on the same device.

"These other applications could be malicious applications that users could be convinced to install. This activity would accept, load, and execute web content from any server, as long as the Intent’s destination URI contained the string “/better-neighborhoods/”.

Stealing sensitive data

In other words, a malicious app installed on an Android device could access sensitive data generated by the Ring app, not only geolocation and camera recordings, but also full names, emails, phone numbers, and postal addresses. 

The Android Ring app has more than 10 million downloads so far.

Checkmarx even took it a step further, using Rekognition (machine learning image and video analysis tool) to automate the analysis of the stolen video content and extract additional useful information, such as faces, text, public figures, information from computer screens, intel on people’s movements, etc.

Checkmarx notified Amazon of the vulnerability on May 1, this year, and less than a month later, on May 27, the company pushed a fix. Therefore, from version .51 (3.51.0 for Android and 5.51.0 for iOS), the vulnerability has been mitigated. 

Amazon has seen it as a high-severity issue and moved fast to issue a patch

“We issued a fix for supported Android customers on May 27, 2022, soon after the researchers’ submission was processed. Based on our review, no customer information was exposed. This issue would be extremely difficult for anyone to exploit, because it requires an unlikely and complex set of circumstances to execute,” the company concluded.

  • Here's our rundown of the best video doorbells to let you see and speak to anyone who comes to your doorstep


from TechRadar - All the latest technology news https://ift.tt/VtGj3Ql
via IFTTT

COMMENTS

BLOGGER
Name

Apps,3858,Business,151,Camera,1155,Earn $$$,3,Gadgets,1741,Games,926,GTA,1,Innovations,3,Mobile,1697,Paid Promotions,5,Promotions,5,Sports,1,Technology,8106,Trailers,796,Travel,37,Trending,4,Trendly News,25335,TrendlyNews,121,Video,5,XIAOMI,13,YouTube - 9to5Google,120,
ltr
item
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews: This nasty Amazon Ring vulnerability could have exposed all your recordings
This nasty Amazon Ring vulnerability could have exposed all your recordings
Trendly News | #ListenNow #Everyday #100ShortNews #TopTrendings #PopularNews #Reviews #TrendlyNews
http://www.trendlynews.in/2022/08/this-nasty-amazon-ring-vulnerability.html
http://www.trendlynews.in/
http://www.trendlynews.in/
http://www.trendlynews.in/2022/08/this-nasty-amazon-ring-vulnerability.html
true
3372890392287038985
UTF-8
Loaded All Posts Not found any posts VIEW ALL Readmore Reply Cancel reply Delete By Home PAGES POSTS View All RECOMMENDED FOR YOU LABEL ARCHIVE SEARCH ALL POSTS Not found any post match with your request Back Home Sunday Monday Tuesday Wednesday Thursday Friday Saturday Sun Mon Tue Wed Thu Fri Sat January February March April May June July August September October November December Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec just now 1 minute ago $$1$$ minutes ago 1 hour ago $$1$$ hours ago Yesterday $$1$$ days ago $$1$$ weeks ago more than 5 weeks ago Followers Follow THIS PREMIUM CONTENT IS LOCKED STEP 1: Share. STEP 2: Click the link you shared to unlock Copy All Code Select All Code All codes were copied to your clipboard Can not copy the codes / texts, please press [CTRL]+[C] (or CMD+C with Mac) to copy