Monday, January 27, 2025
HomeRansomwareMultiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over...

Multiple Bugs in Canon DSLR Camera Let Hackers Infect with Ransomware Over a Rouge WiFi Access Point

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered multiple critical vulnerabilities in Picture Transfer Protocol (PTP) that allows attackers to infect the Canon DSLR camera with ransomware to encrypt the pictures and demand the ransom.

An attacker who is very close with the victim’s WiFi or already hijacked computers with the USB access could propagate them to infect the cameras with deadly malware and ransomware.

There was a period when most users connect their camera to their PC using a USB cable to share the captured data using PTP/USB protocol.

New digital camera models now support WiFi to transfer the files from the camera to the computer via PTP/IP that is accessible to every WiFi-enabled device.

Researchers from Checkpoint found 6 critical vulnerabilities in PTP protocol that allows an attacker to take over the camera and infected with the severe ransomware over the rogue WiFi access and unsecured network.

There are 2 different scenarios that opens a door for attackers to exploit the vulnerabilities found in Picture Transfer Protocol (PTP).

USB – For an attacker that took over your PC, and now wants to propagate into your camera.

WiFi – An attacker can place a rogue WiFi access point at a tourist attraction, to infect your camera.

Vulnerabilities in Canon DSLR EOS

Part of the Research, Checkpoint Researchers mainly focusing on Canon’s EOS 80D DSLR camera that holds more than 50% of the market share, EOS80D model supports both USB and WiFi, Canon has an extensive “modding” community, called Magic Lantern, an open-source free software add-on that adds new features to the Canon EOS cameras.

PTP command handler supports up to 5 arguments for every command, out of 148 commands that perform various operations on camera, researchers narrowed down to 38 commands for this research that receives an input buffer.

Below mentioned vulnerabilities reside in the specific opcode and command name of the Picture Transfer Protocol (PTP).

  1. CVE-2019-5994 – Buffer Overflow in SendObjectInfo  (opcode 0x100C)
  2. CVE-2019-5998 – Buffer Overflow in NotifyBtStatus (opcode 0x91F9)
  3. CVE-2019-5999– Buffer Overflow in BLERequest (opcode 0x914C)
  4. CVE-2019-6000– Buffer Overflow in SendHostInfo (opcode0x91E4)
  5. CVE-2019-6001– Buffer Overflow in SetAdapterBatteryReport (opcode 0x91FD)
  6. CVE-2019-5995 – Silent malicious firmware update

In this case, 3 similar buffer overflow vulnerabilities are found over a global structure, Over stack and heap.

The second and third vulnerability is related to Bluetooth, but the camera model doesn’t support Bluetooth.

Researchers tested these vulnerabilities using the Proof-of-concept to check whether the vulnerabilities are working and it ended up in the camera crashing then later they wrote an exploit to bypass the camera.

According to Checkpoint “After playing around with the firmware update process, we went back to finish our ransomware. The ransomware uses the same cryptographic functions as the firmware update process and calls the same AES functions in the firmware. After encrypting all of the files on the SD Card, the ransomware displays the ransom message to the user.”

In the above video, the developed exploit has been launched against the Camera over WiFi. In this part, the attacker set up a Rogue WiFi access point by sniffing the network.

Faking the AP to have the same name as the one the camera automatically attempts to connect. Once the attacker is within the same LAN as the camera, he can initiate the exploit and infect with ransomware, Researchers said.

All the vulnerability has been reported to Canon and they released an advisory with a firmware update, also Canon has informed that no confirmed cases of these vulnerabilities being exploited to cause harm.

You can read the complete guide of Ransomware Attack Response and Mitigation Checklist.

Sponsored:  – Manage all the Endpoint networks from a single Console.

You can follow us on LinkedinTwitterFacebook for daily Cybersecurity updates also you can take the Best Cybersecurity course online to keep yourself updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

White House Considers Oracle-Led Takeover of TikTok with U.S. Investors

In a significant development, the Trump administration is reportedly formulating a plan to prevent...

Critical Vulnerability in IBM Security Directory Enables Session Cookie Theft

IBM has announced the resolution of several security vulnerabilities affecting its IBM Security Directory...

Critical Apache Solr Vulnerability Grants Write Access to Attackers on Windows

A new security vulnerability has been uncovered in Apache Solr, affecting versions 6.6 through...

GitHub Vulnerability Exposes User Credentials via Malicious Repositories

A cybersecurity researcher recently disclosed several critical vulnerabilities affecting Git-related projects, revealing how improper...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

New Phishing Framework Attack Multiple Brands Login Pages To Steal Credentials

Researchers have identified a sophisticated phishing tactic leveraging Cloudflare's workers.dev, a free domain name...

LockBit Ransomware: 11-Day Timeline from Initial Compromise to Deployment

A well-coordinated cyber intrusion, spanning 11 days, culminated in the deployment of LockBit ransomware...

HellCat and Morpheus Ransomware Share Identical Payloads for Attacks

The cybersecurity landscape witnessed a surge in ransomware activity during the latter half of...