Devil’s Ivy

Devil’s Ivy is a security vulnerability that when exploited enables an attacker to remotely access a video feed and deny the owner access to the feed. In July 2017 the security firm Senrio uncovered a stack buffer overflow vulnerability in the open source third-party toolkit gSOAP, which is used in millions of Internet of Things (IoT) devices, including security cameras from numerous vendors.

Senrio dubbed the vulnerability “Devil’s Ivy” because, like the Devil’s Ivy plant, the attack is able to spread quickly and is nearly impossible to completely eradicate once it has started to spread. This is due in part to gSOAP being included in a toolkit that has been downloaded millions of times and is currently present in thousands of devices.

As an example, the Devil’s Ivy vulnerability was found to be present on 249 video cameras sold by manufacturer Axis, which is the company Senrio first discovered the Devil’s Ivy flaw on.

How Attackers Can Exploit the Devil’s Ivy Flaw

To initiate an attack on the Devil’s Ivy vulnerability, a hacker sends a malicious payload to port 80, at which point the camera or IoT device triggers the buffer stack overflow and initiates code execution at the attacker’s discretion.

In a worst-case scenario, an attacker could prey on the Devil’s Ivy exploit to spy on and gather sensitive video information or prevent video of criminal events like a robbery from being observed or recorded.

The developer of the gSOAP software, Genivia, has released a software update with a patch for the Devil’s Ivy vulnerability, but video cameras and other Internet of Things devices are seldom updated with new software releases in most cases. As a result, the vulnerability is likely to remain an issue in millions of devices for the foreseeable future.

Forrest Stroud
Forrest Stroud
Forrest is a writer for Webopedia. Experienced, entrepreneurial, and well-rounded, he has 15+ years covering technology, business software, website design, programming, and more.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.
Get the Free Newsletter
Subscribe to Daily Tech Insider for top news, trends & analysis
This email address is invalid.

Related Articles

Virtual Private Network (VPN)

A virtual private network (VPN) encrypts a device's Internet access through a secure server. It is most frequently used for remote employees accessing a...

Gantt Chart

A Gantt chart is a type of bar chart that illustrates a project schedule and shows the dependency between tasks and the current schedule...

Input Sanitization

Input sanitization is a cybersecurity measure of checking, cleaning, and filtering data inputs from users, APIs, and web services of any unwanted characters and...

IT Asset Management Software

IT asset management software (ITAM software) is an application for organizing, recording, and tracking all of an organization s hardware and software assets throughout...

ScalaHosting

ScalaHosting is a leading managed hosting provider that offers secure, scalable, and affordable...

HRIS

Human resources information system (HRIS) solutions help businesses manage multiple facets of their...

Best Managed Service Providers...

In today's business world, managed services are more critical than ever. They can...