Hackers may be able to tamper with industrial processes due to flaws in InfiRay thermal cameras
Vulnerabilities in InfiRay thermal cameras could allow malevolent hackers to meddle with industrial processes, such as disrupting production or making changes that result in lower-quality products.
InfiRay is a brand of iRay Technology, a Chinese optical component manufacturer. With products supplied in 89 countries and territories, InfiRay specializes in the research and manufacturing of infrared and thermal imaging solutions.
Researchers from SEC Consult, an Austrian cybersecurity firm, determined that at least one of the vendor’s thermal cameras, the A8Z3, is vulnerable to many potentially catastrophic flaws. The A8Z3 device, which costs over $3,000 on Alibaba in China, is meant for a variety of industrial uses.
According to SEC Consult, the product is vulnerable to five different categories of potentially serious flaws. Hardcoded credentials for the camera’s web application are one concern. These accounts can be termed backdoor accounts because they can’t be deactivated and their passwords can’t be changed. They can give an attacker access to the camera’s web interface. An attacker can then take advantage of another vulnerability to execute arbitrary code.
The researchers also discovered a buffer overflow in the firmware, as well as other obsolete software components are known to be vulnerable. They also discovered a Telnet root shell that is not password protected by default, allowing a local network attacker to run arbitrary commands as root on the camera.
No thermal cameras have been discovered on the internet, according to SEC Consult. An attacker with network access to a device, on the other hand, may utilize the weaknesses to do considerable damage.
According to Security Week, SEC Consult informed Security Week that it didn’t test any other devices from this vendor, but similar flaws are likely to harm other products as well, based on historical experience.
SEC Consult notified the vendor of its discoveries over a year ago, but the company has been unresponsive, so it’s unknown whether updates are available. The cybersecurity firm has made certain technical data public, but no proof-of-concept exploits have been released.