Ring patched an Android bug that could have exposed video footage

Enlarge / Ring digicam photos offer you a view of what is occurring and, in a single safety agency’s experiments, a superb base for machine studying surveillance.


Amazon quietly however rapidly patched a vulnerability in its Ring app that could have exposed customers’ digicam recordings and different information, in accordance with safety agency Checkmarx.

Checkmarx researchers write in a weblog put up that Ring’s Android app, downloaded greater than 10 million instances, made an exercise obtainable to all different purposes on Android units. Ring’s com.ring.nh.deeplink.DeepLinkActivity would execute any internet content material given to it, as long as the tackle included the textual content /better-neighborhoods/.

That alone wouldn’t have granted entry to Ring information, however Checkmarx was ready to make use of a cross-site scripting vulnerability in Ring’s inner browser to level it at an authorization token. Next, Checkmarx obtained a session cookie by authorizing that token and its {hardware} identifier at a Ring endpoint after which used Ring’s APIs to extract names, e mail addresses, telephone numbers, Ring system information (together with geolocation), and saved recordings.

Checkmarx’s video, that includes footage checks and a hoodie-wearing hacker.

And then Checkmarx saved going. With entry to its personal instance customers’ recordings and any variety of machine-learning-powered laptop imaginative and prescient companies (together with Amazon’s personal Rekognition), the safety agency went wide-angle. You could, the agency present in its checks, scan for:


  • Safes, and doubtlessly their combos
  • Images of paperwork containing the phrases “Top Secret” or “Private”
  • Known celebrities and political figures
  • Passwords and passcodes
  • Children, alone, in view of a Ring digicam

To be clear, the vulnerability was seemingly by no means exploited within the wild. Checkmarx reported it on May 1, Amazon confirmed its receipt the identical day, and a repair was launched (3.51.0 for Android, 5.51.0 for iOS). Checkmarx says that Amazon responded to the high-severity difficulty with acknowledgment but additionally deferral. “This issue would be extremely difficult for anyone to exploit because it requires an unlikely and complex set of circumstances to execute,” Amazon informed Checkmarx.

Erez Yalon, VP of safety analysis at Checkmarx, informed The Record that taped-together vulnerabilities are coveted amongst hackers.

“Each would be problematic, but chaining them together, something hackers always try to do, made it so impactful.”

(Update 1:50 p.m. ET: Updated to right spelling of Erez Yalon’s identify. Ars regrets the error.)


Please enter your comment!
Please enter your name here

Popular Posts

Singapore Grand Prix is tough but he’s excited

After a two-year hiatus due to the pandemic, the Singapore Grand Prix — Formula One's first ever evening race — is roaring again this...

Nintendo carries out 10-for-1 stock split to lure new investors

Nintendo carried out a 10-for-1 stock split which reduces the worth of a person share. The 133 12 months previous Japanese gaming big hopes...

Nike (NKE) earnings Q1 2023

A lady outlets for footwear within the Nike Factory Store on the Outlet Shoppes at El Paso, in El Paso, Texas on November 26,...

What’s behind the bounce and Club stocks in the news

Every weekday the CNBC Investing Club with Jim Cramer holds a "Morning Meeting" livestream at 10:20 a.m. ET. Here's a recap of Wednesday's key...

How to get a Google Stadia refund for games and hardware

Such is the downstream impact of gaming’s latest pivot away from bodily media: Google is shutting down Stadia, its beleaguered game-streaming platform,...