Anker’s Eufy lied to us about the security of its security cameras

bnew

Veteran
Joined
Nov 1, 2015
Messages
69,417
Reputation
10,652
Daps
187,602

Despite claims of only using local storage with its security cameras, Eufy has been caught uploading identifiable footage to the cloud. And it’s even possible to view the camera streams using VLC.​

By SEAN HOLLISTER / @starfire2258
Nov 30, 2022, 8:30 PM EST

191106_165716_9.png

A Eufy security camera, from Anker. Image: Anker/Eufy

Anker has built a remarkable reputation for quality over the past decade, building its phone charger business into an empire spanning all sorts of portable electronics — including the Eufy home security cameras we’ve recommended over the years. Eufy’s commitment to privacy is remarkable: it promises your data will be stored locally, that it “never leaves the safety of your home,” that its footage only gets transmitted with “end-to-end” military-grade encryption, and that it will only send that footage “straight to your phone.”

So you can imagine our surprise to learn you can stream video from a Eufy camera, from the other side of the country, with no encryption at all.

chrome_GwYzzn6O0M.png

Part of Anker’s Eufy “privacy commitment”. Screenshot by Sean Hollister / The Verge

Worse, it’s not yet clear how widespread this might be — because instead of addressing it head-on, the company falsely claimed to The Verge that it wasn’t even possible.

On Thanksgiving Day, infosec consultant Paul Moore and a hacker who goes by Wasabi both alleged that Anker’s Eufy cameras can stream encryption-free through the cloud — just by connecting to a unique address at Eufy’s cloud servers with the free VLC Media Player.



When we asked Anker point-blank to confirm or deny that, the company categorically denied it. “I can confirm that it is not possible to start a stream and watch live footage using a third-party player such as VLC,” Brett White, a senior PR manager at Anker, told me via email.

But The Verge can now confirm that’s not true. This week, we repeatedly watched live footage from two of our own Eufy cameras using that very same VLC media player, from across the United States — proving that Anker has a way to bypass encryption and access these supposedly secure cameras through the cloud.

There is some good news: there’s no proof yet that this has been exploited in the wild, and the way we initially obtained the address required logging in with a username and password before Eufy’s website will cough up the encryption-free stream. (We’re not sharing the exact technique here.)

Also, it seems like it only works on cameras that are awake. We had to wait until our camera’s owner pressed a button before the VLC stream came to life.

But it also gets worse: Eufy’s best practices appear to be so shoddy that bad actors might be able to figure out the address of a camera’s feed — because that address largely consists of your camera’s serial number encoded in Base64, something you can easily reverse with a simple online calculator.

The address also includes a Unix timestamp you can easily create, plus a token that Eufy’s servers don’t actually seem to be validating (we changed our token to “arbitrarypotato” and it still worked), and a four-digit random hex whose 65,536 combinations could easily be brute forced.

“This is definitely not how it should be designed,” Mandiant vulnerability engineer Jacob Thompson tells The Verge. For one thing, serial numbers don’t change, so a bad actor could give or sell or donate a camera to Goodwill and quietly keep watching the feeds. But also, he points out that companies don’t tend to keep their serial numbers secret. Some stick them right on the box they sell at Best Buy — yes, including Eufy.

On the plus side, Eufy’s serial numbers are long at 16 characters and aren’t just an increasing number. “You’re not going to be able to just guess at IDs and begin hitting them,” says Mandiant Red Team consultant Dillon Franke, calling it a possible “saving grace” of this disclosure. “It doesn’t sound quite as bad as if it’s UserID 1000, then you try 1001, 1002, 1003.”

It could be worse. When Georgia Tech security researcher and Ph.D. candidate Omar Alrawi was studying poor, smart home practices in 2018, he saw some devices substituting their own MAC address for security — even though a MAC address is only twelve characters long, and you can generally figure out the first six characters just by knowing which company made a gadget, he explains.

But we also don’t know how else these serial numbers might leak, or if Eufy might even unwittingly provide them to anyone who asks. “Sometimes there are APIs that will return some of that unique ID information,” says Franke. “The serial number now becomes critical to keep secret, and I don’t think they’d treat it that way.”

Thompson also wonders whether there are other potential attack vectors now that we know Eufy’s cameras aren’t wholly encrypted: “If the architecture is such that they can order the camera to start streaming at any time, anyone with admin access has the ability to access the IT infrastructure and watch your camera,” he warns. That’s a far cry from Anker’s claim that footage is “sent straight to your phone—and only you have the key.”

By the way, there are other worrying signs that Anker’s security practices may be much, much poorer than it has let on. This whole saga started when infosec consultant Moore started tweeting accusations that Eufy had violated other security promises, including uploading thumbnail images (including faces) to the cloud without permission and failing to delete stored private data. Anker reportedly admitted to the former, but called it a misunderstanding.



Most worrying if true, he also claims that Eufy’s encryption key for its video footage is literally just the plaintext string “ZXSecurity17Cam@”. That phrase also appears in a GitHub repo from 2019, too.

Anker didn’t answer The Verge’s straightforward yes-or-no question about whether “ZXSecurity17Cam@” is the encryption key.

We couldn’t get more details from Moore, either; he told The Verge he can’t comment further now that he’s started legal proceedings against Anker.

Now that Anker has been caught in some big lies, it’s going to be hard to trust whatever the company says next — but for some, it may be important to know which cameras do and do not behave this way, whether anything will be changed, and when. When Wyze had a vaguely similar vulnerability, it swept it under the rug for three years; hopefully, Anker will do far, far better.

Some may not be willing to wait or trust anymore. “If I came across this news and had this camera inside my home, I’d immediately turn it off and not use it, because I don’t know who can view it and who cannot,” Alrawi tells me.

Wasabi, the security engineer who showed us how to get a Eufy camera’s network address, says he’s ripping all of his out. “I bought these because I was trying to be security conscious!” he exclaims.

With some specific Eufy cams, you could perhaps try switching them to use Apple’s HomeKit Secure Video instead.
With reporting and testing by Jen Tuohy and Nathan Edwards

Update December 1st, 3:33PM ET: After further testing, we’re not seeing the VLC streams begin based solely on the camera detecting motion. We’re not sure if that’s a change since yesterday or something I got wrong in our initial report. It does appear that Eufy is making changes — it appears to have removed access to the method we were using to get the address of our streams, although an address we already obtained is still working.
 

Savvir

Veteran
Joined
Oct 8, 2014
Messages
22,263
Reputation
3,921
Daps
114,902
Infosec costs alot...

Companies are all about their bottom line...

:yeshrug:
 

BeeCityRoller

New Bee
Supporter
Joined
May 2, 2012
Messages
4,254
Reputation
1,365
Daps
17,932
Reppin
Queen City
This is the second security issue they've had, first time was when I got them for my house last year. Still gave them a chance.

Since changing out some light fixtures I've learned how to do basic hardwiring so I'll upgrade to a true local storage solution when I find a good deal.
 

RennisDeynolds

I am untethered and my rage knows no bounds!
Joined
Feb 2, 2017
Messages
42,678
Reputation
7,795
Daps
124,243
Reppin
Paddys Pub
Can't trust Chinese brands to do the right thing. You can't trust any brand really but especially not Chinese :hubie: Their whole wave is stealing IP and data
 

bnew

Veteran
Joined
Nov 1, 2015
Messages
69,417
Reputation
10,652
Daps
187,602


Anker’s Eufy breaks its silence on security cam security​

After ignoring questions for weeks, Anker’s PR department forwarded us a statement from Eufy that admits but neither explains nor apologizes.​

By SEAN HOLLISTER
Dec 20, 2022, 6:47 PM EST

A Eufy camera underwater, air bubbles bubbling up

Image: Eufy

On the last episode of “Will Anker ever tell us what’s actually going on with its security cameras rather than lying and covering its tracks,” we told you how Eufy’s customer support team is now quietly providing some of the answers to the questions that the company had publicly ignored about its smart home camera security.


Now, Anker is finally taking a stab at a public explanation, in a new blog post titled “To our eufy Security Customers and Partners.” Unfortunately, it contains no apology, and doesn’t begin to address why anyone would be able to view an unencrypted stream in VLC Media Player on the other side of the country, from a supposedly always-local, always-end-to-end-encrypted camera.

What it does contain is a clear admission: “eufy Security ’s Live View Feature on its Web-Portal Feature Has a Security Flaw,” the company admits in bold letters.

But this is all Anker has to say about that very suspicious issue:

eufy Security ’s Live View Feature on its Web-Portal Feature Has a Security Flaw
First, no user data has been exposed, and the potential security flaws discussed online are speculative. However, we do agree there were some key areas for improvement. So we have made the following changes.
Today, users can still log in to our eufy.com Web portal to view live streams of their cameras. However, users can no longer view live streams (or share active links to these live streams with others) outside of eufy’s secure Web portal. Anyone wishing to view these links must first log in to the eufy.com Web portal.
We will continue to look for ways to enhance this feature.


While stopping short of an apology, the company does acknowledge that “we know the need for more straightforward and timely communications on these issues has frustrated many customers,” and says it has stayed silent because it’s “been using the last few weeks to research these possible threats and gather all the facts before publicly addressing these claims.”

“Moving forward, we will need to better balance our need to get ‘all the facts’ with our obligation to keep our customers more quickly informed,” promises Anker.

The post also addresses some other concerns that security researchers have raised, like how Eufy was uploading thumbnails from its cameras, including pictures of faces, to the cloud without making users aware, so that it can deliver push notifications. Anker says those images are protected with end-to-end encryption, and reiterates that it’s now making customers aware that they have a choice of local or cloud push notifications in an updated version of its app. Good!

Here is a list of questions that still need to be answered. I’m sending them to Anker/Eufy today:

Why do your supposedly end-to-end encrypted cameras produce unencrypted streams at all?
Under what circumstances is video actually encrypted?
Do any other parts of Eufy’s service rely on unencrypted streams, such as Eufy’s desktop web portal?
How long is an unencrypted stream accessible?
Are there any Eufy camera models that do *not* transmit unencrypted streams?
Will Eufy completely disable the transmission of unencrypted streams? When? How? If not, why not?
If not, will Eufy disclose to its customers that their streams are not actually always end to end encrypted? When and where?
Has Eufy changed the stream URLs to something more difficult to reverse engineer? If not, will Eufy do so? When?
Are unencrypted streams still accessible when cameras use HomeKit Secure Video?
Is it true that ”ZXSecurity17Cam@” is an actual encryption key? If not, why did that appear in your code labeled as an encryption key and appear in a GitHub repo from 2019?
Beyond the thumbnails and the unencrypted streams, are there any other private data or identifying elements that Eufy’s cameras allow access to via the cloud?
Beyond potentially tapping into an unencrypted stream, are there any other things that Eufy’s servers can remotely tell a camera to do?
What keeps Eufy and Anker employees from tapping into these streams?
Which other specific measures will Eufy take to address its security and reassure customers?
Has Anker retained any independent security firms to conduct an audit of its practices following these disclosures? Which?
Will Anker be offering refunds to those customers who bought cameras based on Eufy’s privacy commitment?
Why did Anker tell The Verge that it was not possible to view the unencrypted stream in an app like VLC?
Does eufy share video recordings with law enforcement agencies?
We will provide the company’s responses — or lack of responses — in a future story.
 

Satsui no Hadou

CHICANO 🇲🇽 🇺🇸
Joined
Mar 11, 2022
Messages
1,421
Reputation
492
Daps
7,273
People are going to huff and haw but still use these camera systems without even doing so much as change the password. There are too many cameras all around the world that are free to view if you know where to look. From offices to schools to public venues and you don’t need any credentials to watch them.
 
Top