www.greynoise.io Open in urlscan Pro
35.152.119.144  Public Scan

URL: https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-th...
Submission: On November 01 via api from TR — Scanned from IT

Form analysis 2 forms found in the DOM

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367

<form id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367"
  class="hs-form-private hsForm_64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367_2de2f668-414b-4d36-b228-1838aaa74619 hs-form stacked"
  target="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" data-instance-id="2de2f668-414b-4d36-b228-1838aaa74619" data-form-id="64495932-6892-4568-8bfc-8ff26d504367" data-portal-id="4282754"
  data-test-id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" class="" placeholder="Enter your Email"
      for="email-64495932-6892-4568-8bfc-8ff26d504367_follow-us-form"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" name="email" required="" placeholder="Email address..." type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="SUBSCRIBE"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1730426998103&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1729881488120&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;clonedFromForm&quot;:&quot;13928cca-437a-4538-b318-8d77f18441bf&quot;,&quot;notifyHubSpotOwner&quot;:&quot;true&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI | GreyNoise Blog&quot;,&quot;pageUrl&quot;:&quot;https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;5ffa198430577738bbe8dd366ac4a663&quot;,&quot;__hsfp&quot;:2458269893,&quot;__hssc&quot;:&quot;9901034.1.1730426999286&quot;,&quot;__hstc&quot;:&quot;9901034.5ffa198430577738bbe8dd366ac4a663.1730426999286.1730426999286.1730426999286.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-2de2f668-414b-4d36-b228-1838aaa74619&quot;,&quot;formInstanceId&quot;:&quot;follow-us-form&quot;,&quot;rumScriptExecuteTime&quot;:416,&quot;rumTotalRequestTime&quot;:680.9000005722046,&quot;rumTotalRenderTime&quot;:807,&quot;rumServiceResponseTime&quot;:264.9000005722046,&quot;rumFormRenderTime&quot;:126.09999942779541,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1730426999294,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;4282754&quot;,&quot;formId&quot;:&quot;64495932-6892-4568-8bfc-8ff26d504367&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-2de2f668-414b-4d36-b228-1838aaa74619&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;follow-us-form&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;2de2f668-414b-4d36-b228-1838aaa74619&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.6227&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.6227&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;6227&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1730426998205,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI | GreyNoise Blog\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1730426998207,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;IT\&quot;&quot;},{&quot;clientTimestamp&quot;:1730426999291,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;5ffa198430577738bbe8dd366ac4a663\&quot;}&quot;}]}"><iframe
    name="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_follow-us-form" style="display: none;"></iframe>
</form>

POST https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367

<form id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" method="POST" accept-charset="UTF-8" enctype="multipart/form-data" novalidate=""
  action="https://forms.hsforms.com/submissions/v3/public/submit/formsnext/multipart/4282754/64495932-6892-4568-8bfc-8ff26d504367"
  class="hs-form-private hsForm_64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367 hs-form-64495932-6892-4568-8bfc-8ff26d504367_21e37841-c3b8-4e3a-baf5-b69ff4c00fde hs-form stacked"
  target="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" data-instance-id="21e37841-c3b8-4e3a-baf5-b69ff4c00fde" data-form-id="64495932-6892-4568-8bfc-8ff26d504367" data-portal-id="4282754"
  data-test-id="hsForm_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form">
  <div class="hs_email hs-email hs-fieldtype-text field hs-form-field"><label id="label-email-64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" class="" placeholder="Enter your Email"
      for="email-64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form"><span>Email</span><span class="hs-form-required">*</span></label>
    <legend class="hs-field-desc" style="display: none;"></legend>
    <div class="input"><input id="email-64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" name="email" required="" placeholder="Email address..." type="email" class="hs-input" inputmode="email" autocomplete="email" value=""></div>
  </div>
  <div class="hs_submit hs-submit">
    <div class="hs-field-desc" style="display: none;"></div>
    <div class="actions"><input type="submit" class="hs-button primary large" value="SUBSCRIBE"></div>
  </div><input name="hs_context" type="hidden"
    value="{&quot;embedAtTimestamp&quot;:&quot;1730426998266&quot;,&quot;formDefinitionUpdatedAt&quot;:&quot;1729881488120&quot;,&quot;lang&quot;:&quot;en&quot;,&quot;embedType&quot;:&quot;REGULAR&quot;,&quot;clonedFromForm&quot;:&quot;13928cca-437a-4538-b318-8d77f18441bf&quot;,&quot;notifyHubSpotOwner&quot;:&quot;true&quot;,&quot;renderRawHtml&quot;:&quot;true&quot;,&quot;userAgent&quot;:&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36&quot;,&quot;pageTitle&quot;:&quot;GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI | GreyNoise Blog&quot;,&quot;pageUrl&quot;:&quot;https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai&quot;,&quot;isHubSpotCmsGeneratedPage&quot;:false,&quot;hutk&quot;:&quot;5ffa198430577738bbe8dd366ac4a663&quot;,&quot;__hsfp&quot;:2458269893,&quot;__hssc&quot;:&quot;9901034.1.1730426999286&quot;,&quot;__hstc&quot;:&quot;9901034.5ffa198430577738bbe8dd366ac4a663.1730426999286.1730426999286.1730426999286.1&quot;,&quot;formTarget&quot;:&quot;#hbspt-form-21e37841-c3b8-4e3a-baf5-b69ff4c00fde&quot;,&quot;formInstanceId&quot;:&quot;subscribe-box-form&quot;,&quot;rumScriptExecuteTime&quot;:454.20000076293945,&quot;rumTotalRequestTime&quot;:955.7000007629395,&quot;rumTotalRenderTime&quot;:1056.5,&quot;rumServiceResponseTime&quot;:501.5,&quot;rumFormRenderTime&quot;:100.79999923706055,&quot;connectionType&quot;:&quot;4g&quot;,&quot;firstContentfulPaint&quot;:0,&quot;largestContentfulPaint&quot;:0,&quot;locale&quot;:&quot;en&quot;,&quot;timestamp&quot;:1730426999297,&quot;originalEmbedContext&quot;:{&quot;portalId&quot;:&quot;4282754&quot;,&quot;formId&quot;:&quot;64495932-6892-4568-8bfc-8ff26d504367&quot;,&quot;region&quot;:&quot;na1&quot;,&quot;target&quot;:&quot;#hbspt-form-21e37841-c3b8-4e3a-baf5-b69ff4c00fde&quot;,&quot;isBuilder&quot;:false,&quot;isTestPage&quot;:false,&quot;isPreview&quot;:false,&quot;formInstanceId&quot;:&quot;subscribe-box-form&quot;,&quot;isMobileResponsive&quot;:true},&quot;correlationId&quot;:&quot;21e37841-c3b8-4e3a-baf5-b69ff4c00fde&quot;,&quot;renderedFieldsIds&quot;:[&quot;email&quot;],&quot;captchaStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;emailResubscribeStatus&quot;:&quot;NOT_APPLICABLE&quot;,&quot;isInsideCrossOriginFrame&quot;:false,&quot;source&quot;:&quot;forms-embed-1.6227&quot;,&quot;sourceName&quot;:&quot;forms-embed&quot;,&quot;sourceVersion&quot;:&quot;1.6227&quot;,&quot;sourceVersionMajor&quot;:&quot;1&quot;,&quot;sourceVersionMinor&quot;:&quot;6227&quot;,&quot;allPageIds&quot;:{},&quot;_debug_embedLogLines&quot;:[{&quot;clientTimestamp&quot;:1730426998481,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved pageContext values which may be overriden by the embed context: {\&quot;pageTitle\&quot;:\&quot;GreyNoise Intelligence Discovers Zero-Day Vulnerabilities in Live Streaming Cameras with the Help of AI | GreyNoise Blog\&quot;,\&quot;pageUrl\&quot;:\&quot;https://www.greynoise.io/blog/greynoise-intelligence-discovers-zero-day-vulnerabilities-in-live-streaming-cameras-with-the-help-of-ai\&quot;,\&quot;userAgent\&quot;:\&quot;Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/130.0.0.0 Safari/537.36\&quot;,\&quot;isHubSpotCmsGeneratedPage\&quot;:false}&quot;},{&quot;clientTimestamp&quot;:1730426998482,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved countryCode property from normalized embed definition response: \&quot;IT\&quot;&quot;},{&quot;clientTimestamp&quot;:1730426999294,&quot;level&quot;:&quot;INFO&quot;,&quot;message&quot;:&quot;Retrieved analytics values from API response which may be overriden by the embed context: {\&quot;hutk\&quot;:\&quot;5ffa198430577738bbe8dd366ac4a663\&quot;}&quot;}]}"><iframe
    name="target_iframe_64495932-6892-4568-8bfc-8ff26d504367_subscribe-box-form" style="display: none;"></iframe>
</form>

Text Content

View exploit activity on the CVEs related to Pacific Rim
View CVEs
 * Why GreyNoise
 * Products
    * For SOC teams
    * For Vulnerability Management teams
    * For Threat Hunting teams
    * Integrations

 * Partners
    * GreyNoise Partnerships
    * Reseller Partners
    * MSSPs
    * Technical Alliances
    * OEM Partners

 * Resources
    * Blog
    * Resource Library
    * Storm Watch Podcast
    * ROI Calculator
    * Tag Request
    * Documentation

 * Company
    * About
    * Press Room
    * In the News
    * Upcoming Events
    * Community
    * Careers
    * GreyNoise Love

Login

Search for free
Get a demo
Get a demo
Login

Search data
 * Why GreyNoise
 * Products
    * For SOC teams
    * For Vulnerability Management teams
    * For Threat Hunting teams
    * Integrations

 * Partners
    * GreyNoise Partnerships
    * Reseller Partners
    * MSSPs
    * Technical Alliances
    * OEM Partners

 * Resources
    * Blog
    * Resource Library
    * Storm Watch Podcast
    * ROI Calculator
    * Tag Request
    * Documentation

 * Company
    * About
    * Press Room
    * In the News
    * Upcoming Events
    * Community
    * Careers
    * GreyNoise Love



Blog
>
Insights
Follow us
Follow us and don’t miss a thing.

Get the latest blog articles delivered right to your inbox.
Email*



Insights


GREYNOISE INTELLIGENCE DISCOVERS ZERO-DAY VULNERABILITIES IN LIVE STREAMING
CAMERAS WITH THE HELP OF AI

Noah Stone

October 31, 2024



GreyNoise has discovered previously undisclosed zero-day vulnerabilities in
IoT-connected live streaming cameras, leveraging AI to catch an attack before it
could escalate. These cameras are reportedly used in sectors such as industrial
operations, healthcare, and other sensitive environments like houses of worship,
highlighting the urgent need for stronger cybersecurity defenses as the threat
landscape continues to evolve.

This discovery was made possible after a GreyNoise honeypot detected an attempt
to execute an exploit against it. An attacker had developed and automated a
zero-day vulnerability exploit, using a broad-spectrum reconnaissance and
targeting strategy to run it across the internet. However, the exploit hit
GreyNoise’s global sensor network, where GreyNoise’s proprietary internal AI
technology flagged the unusual activity. Upon further investigation, GreyNoise
researchers discovered the zero-day vulnerabilities. Once exploited, attackers
could potentially seize complete control of the cameras, view and/or manipulate
video feeds, disable camera operations, and enlist the devices into a botnet to
launch denial-of-service attacks. 

This marks one of the first instances where threat detection has been augmented
by AI to discover zero-day vulnerabilities. By surfacing malicious traffic that
traditional tools would have missed, GreyNoise successfully intercepted the
attack, identified the vulnerabilities, and reported them before they could be
widely exploited. The company’s proactive approach, combining AI-powered
detection with expert human analysis, proves that AI can dramatically accelerate
the discovery of vulnerabilities — making the internet safer, one discovery at a
time. 

GreyNoise partnered with VulnCheck to responsibly disclose the flaws, tracked as
CVE-2024-8956 and CVE-2024-8957.   

View the full technical analysis and register now for GreyNoise’s expert panel
webinar to learn more about the broader implications of these findings for
security professionals. 


AFFECTED DEVICES AND COMMON USE-CASES

The vulnerabilities impact NDI-enabled pan-tilt-zoom (PTZ) cameras from multiple
manufacturers. Affected devices use VHD PTZ camera firmware < 6.3.40 used in
PTZOptics, Multicam Systems SAS, and SMTAV Corporation devices based on
Hisilicon Hi3516A V600 SoC V60, V61, and V63. These cameras, which feature an
embedded web server allowing for direct access by web browser, are reportedly
deployed in environments where reliability and privacy are crucial, including:

 * Industrial and manufacturing plants for machinery surveillance and quality
   control.


Industrial Machinery Surveillance. Source: PTZOptics.com

AI-Driven Manufacturing Camera. Source: PTZOptics.com

‍

 * Business conferences for high-definition video streaming and remote
   presentations. 


Business Streaming Setup. Source: PTZOptics.com

‍

 * Healthcare settings for telehealth consultations and surgical live streams.


Surgical Live Stream. Source: PTZOptics.com

Telehealth Camera in Hospital Room. Source: PTZOptics.com


‍

 * State and local government environments, including courtrooms. 


Courtroom Surveillance Camera. Source: PTZOptics.com

‍

 * Houses of worship for live streaming of religious services. 


Religious Service Streaming Camera. Source: PTZOptics.com

‍

Affected devices are typically high-cost live streaming cameras, sometimes
exceeding several thousand dollars. 


VULNERABILITIES DISCOVERED

CVSS 9.1 (CRITICAL)

INSUFFICIENT AUTHENTICATION: CVE-2024-8956 

 * Inadequate authentication mechanisms could allow an attacker to access
   sensitive information like usernames, MD5 password hashes, and configuration
   data. MD5 hashes have long been considered insecure, meaning attackers could
   potentially crack them and gain administrative access. 

CVSS 7.2 (HIGH)

OS COMMAND INJECTION: CVE-2024-8957

 * Chained with CVE-2024-8956, an attacker can execute arbitrary OS commands on
   the affected cameras, potentially allowing an attacker to seize full control
   of the system. 


FULL CAMERA TAKEOVER, UNAUTHORIZED SURVEILLANCE, DATA BREACH, BROADER ATTACKS,
AND MORE

GreyNoise found the affected cameras to be vulnerable to a range of potentially
dangerous attacks. These vulnerabilities, if exploited, could potentially expose
sensitive business meetings, compromise telehealth sessions, and disrupt cameras
deployed in industrial settings, leaving organizations potentially exposed to
data and privacy breaches.

FULL CAMERA TAKEOVER AND UNAUTHORIZED SURVEILLANCE

 * By exploiting both CVE-2024-8956 and CVE-2024-8957, an attacker could
   potentially seize full control of the camera, view and/or manipulate the
   video feeds, and gain unauthorized access to sensitive information. Devices
   could also be potentially enlisted into a botnet and used for
   denial-of-service attacks. 

Attacks like this are not new — in 2021, live feeds of 150,000 cameras inside
schools, hospitals, and more were exposed. Vulnerable IoT devices are prime
targets for attackers looking to add compromised devices to a botnet, like the
infamous Mirai botnet. 

BROADER NETWORK ATTACKS AND DATA BREACH

 * An attacker could extract network details, including IP addresses, MAC
   addresses, and gateway configurations, potentially leveraging this
   information to pivot and move laterally into the device’s local network. This
   could potentially compromise other systems on the same network, which could
   lead to broader data breaches or even the spread of ransomware. 

DISABLEMENT OF CAMERA OPERATIONS

 * CVE-2024-8956 allows for configuration files to be updated or entirely
   overwritten. An attacker could exploit this vulnerability to intentionally
   misconfigure or disable the camera, potentially disrupting camera
   operations. 


HOW GREYNOISE DISCOVERED THESE VULNERABILITIES USING AI

Security teams today face an overwhelming number of alerts, many of which result
from harmless internet activity like routine scans and benign traffic. With
countless alerts pouring in daily, identifying threats becomes incredibly
difficult, and many serious vulnerabilities can go unnoticed amid the noise. 

This is where AI steps in. GreyNoise’s Sift, powered by large language models
(LLMs) trained on vast amounts of internet traffic — including traffic targeting
IoT devices — identifies anomalies that traditional systems may miss. Instead of
just reacting to known threats, Sift excels at spotting new anomalies, threats
that haven't been identified yet or don’t fit any known signatures. 

WHAT MAKES SIFT DIFFERENT 

Sift analyzes real-time internet traffic and enriches that data with GreyNoise’s
proprietary datasets. It then runs the data through advanced AI systems, which
help separate routine activity from potential threats. This process allows
researchers to focus on truly meaningful threats without getting lost in the
noise. 

In this case, Sift flagged unrecognized traffic that had not been tagged as a
known threat. This caught the attention of GreyNoise researchers, who further
investigated the unusual traffic. Their investigation led to the discovery of
two previously unknown zero-day vulnerabilities in live streaming cameras —
highlighting how AI can transform the speed and accuracy of cybersecurity
research. 

“This isn’t about the specific software or how many people use it — it’s about
how AI helped us catch a zero-day exploit we might have missed otherwise,” said
Andrew Morris, Founder and Chief Architect at GreyNoise Intelligence. “We caught
it before it could be widely exploited, reported it, and got it patched. The
attacker put a lot of effort into developing and automating this exploit, and
they hit our sensors. Today it’s a camera, but tomorrow it could be a zero-day
in critical enterprise software. This discovery proves that AI is becoming
essential for detecting and stopping sophisticated threats at scale.” 

HUMAN RESEARCHERS + AI: A POWERFUL COMBINATION 

By rapidly filtering out irrelevant traffic, Sift gives human researchers a
clear head start. Capable of sifting through millions of data points, it enables
researchers to focus on critical threats in real-time. This combination of
AI-driven anomaly detection and human-led investigation is essential in today’s
fast-paced cybersecurity landscape, where attackers are constantly evolving
their tactics. Without Sift’s machine learning capabilities, these
vulnerabilities might have remained hidden. 


THE BROADER IOT CHALLENGE: PROLIFERATION AND INTERNET NOISE 

GreyNoise’s discoveries shed light on a larger issue facing the rapidly growing
IoT landscape. With nearly 19 billion IoT devices in operation globally,
industrial and critical infrastructure sectors rely on these devices for
operational efficiency and real-time monitoring. However, the sheer volume of
data generated makes it challenging for traditional tools to discern genuine
threats from routine network traffic, leaving systems vulnerable to
sophisticated attacks. Last month, U.S. authorities dismantled a botnet that
leveraged a variety of IoT devices, including IP cameras. IoT devices remain a
prime target for attackers looking to exploit insecure design and
functionality. 


RECOMMENDATIONS TO PROTECT YOUR ORGANIZATION

Organizations using VHD PTZ camera firmware < 6.3.40 used in PTZOptics, Multicam
Systems SAS, and SMTAV Corporation devices based on Hisilicon Hi3516A V600 SoC
V60, V61, and V63 should take immediate action to patch the discovered
vulnerabilities and secure their systems. 

VulnCheck alerted affected manufacturers to the flaws, only receiving a response
from PTZOptics. The manufacturer released firmware updates addressing these
flaws.

Read the GreyNoise Labs blog for technical analysis and deeper insight into how
Sift helped discover these zero-day vulnerabilities.


DON’T MISS THE WEBINAR!

Join our expert panel for an exclusive webinar where we dive deep into the
technical details and strategic implications of this discovery to provide the
context you need to better protect your organization. 

Register now to reserve your spot today and learn how AI-driven cybersecurity is
changing the status quo and how it can transform your security strategy. 

‍

This article is a summary of the full, in-depth version on the GreyNoise Labs
blog.
Read the full report
Like or share:


GET THE LATEST BLOG ARTICLES DELIVERED RIGHT TO YOUR INBOX.

Thank you! Your submission has been received!
Oops! Something went wrong while submitting the form.
Email*


Be part of the conversation in our Community Slack group.
Join us on Slack
Follow us and don’t miss a thing.



RELATED CONTENT

View all related articles
Insights


GREYNOISE INTELLIGENCE DISCOVERS ZERO-DAY VULNERABILITIES IN LIVE STREAMING
CAMERAS WITH THE HELP OF AI

Noah Stone

Oct 31, 2024
Insights


U.S. AND UK WARN OF RUSSIAN CYBER THREATS: 9 OF 12 GREYNOISE-TRACKED
VULNERABILITIES IN THE ADVISORY ARE BEING PROBED RIGHT NOW

Noah Stone

Oct 17, 2024
Insights


PROTECTING DEMOCRACY FROM THE GROWING THREAT OF DEEPFAKES AND DISINFORMATION

boB Rudis

Oct 9, 2024

Insights
Products
 * SOC teams
 * Vulnerability Management teams
 * Threat Hunting teams
 * Integrations

Partners
 * GreyNoise Partnerships
 * Reseller Partners
 * MSSPs
 * Technical Alliances
 * OEM Partners

Resources
 * Blog
 * Resources Library
 * Storm Watch Podcast
 * ROI Calculator
 * Tag Request
 * Documentation

Company
 * About
 * Press Room
 * In the News
 * Upcoming Events
 * Community
 * Careers
 * GreyNoise Love

© 2024 GreyNoise, Inc. All rights reserved.


 * Terms
 * Privacy
 * Security
 * Cookies
 * Patents
 * Principles

Cookie Settings
We use cookies to ensure you get the best experience on our website. Learn more
Got it