Critical Security Flaw Discovered in Amazon’s Ring Video Doorbell Pro Devices
In a recent disclosure by cybersecurity researchers at Bitdefender, a significant vulnerability has been identified in Amazon’s Ring Video Doorbell Pro devices. This flaw presents an opportunity for nearby attackers to intercept WiFi passwords and potentially execute a variety of man-in-the-middle (MitM) attacks against other devices connected to the same network.
For those unfamiliar, the Ring Video Doorbell is a smart security camera that enables users to see and communicate with visitors from virtually anywhere in the world via a mobile app. This device connects to a user’s WiFi network, allowing seamless remote access for various functionalities.
The issue arises during the initial setup of the Ring Video Doorbell, wherein users must share their WiFi password to connect the device. To facilitate this, the doorbell must enter a configuration mode that activates an unprotected wireless access point, allowing the Ring app to connect without a password. Researchers at The Hacker News highlighted that this insecure initial communication is transmitted through plain HTTP, making it susceptible to interception.
Consequently, unauthorized individuals could connect to the exposed access point and exploit this vulnerability to capture the WiFi password using a MitM attack during the initial configuration process. Though this exploit is limited to the single instance of device setup, attackers could still manipulate situations to force users into reconfiguring the device post-setup.
Experts suggest that attackers can achieve this by sending continuous de-authentication messages to the Ring device, creating a false appearance of malfunctions. Once users are coaxed into re-entering the configuration mode, their credentials become vulnerable to capture in plaintext.
The implications of this vulnerability extend beyond merely intercepting WiFi passwords. Once an attacker gains access, they can interact with every device on the local network, execute MitM attacks, access stored data on local devices, and exploit any weaknesses in the network. Such capabilities could lead to unauthorized access to personal information, including emails and private videos from security cameras.
Bitdefender first identified this vulnerability in June and responsibly reported it to Amazon. Following subsequent communications, an automatic patch was partially deployed in early September. However, in early August, Amazon closed the original vulnerability report, labeling it a duplicate without clarification on prior documentation of this issue.
A spokesperson from the Ring emphasized the importance of customer trust and indicated that the company takes security seriously, noting that an automatic update has been rolled out to address the identified flaw. The Ring Video Doorbell had previously faced a similar security challenge in 2016, which was also rapidly addressed.
This incident underscores the pressing need for vigilance regarding smart home device security. Malware tactics characterized by initial access and exploitation techniques—as classified by the MITRE ATT&CK framework—could be employed by malicious actors in such scenarios. Business owners must remain informed about vulnerabilities like these to protect sensitive information and network integrity effectively.
As the technological landscape evolves, it becomes increasingly critical to prioritize security measures in IoT devices, ensuring practices are up-to-date and vulnerabilities are swiftly addressed to mitigate risks.