A poorly configured security camera is a vulnerability, as it is an easy target for hackers. Tools are developed to hack Internet Protocol (IP) cameras with ease, and beyond that, some owners even leave theirs accessible to everyone.
According to the Shodan search engine, at least 8,373 real-time streaming protocol (RTSP) cameras are on display around the world. Anyone could find even the latest saved screenshots of what the cameras see. Some cameras can even be found on Google by searching for parts of the default URLs typically used by camera providers.
Typically, many cameras stick with default access passwords like “admin.”
Hackers have a powerful set of tools.
Cybercriminals can exploit weaknesses in cameras and networks, with widely available open-source tools. A few commands allow you to scan networks for and access exposed cameras, or brute force credentials using dictionaries. When it comes to scanning the preferred IP address, a single command will reveal if the RTSP stream can be found at the destination.
“Most IP cameras use RTSP to establish and control video and audio streams. RTSP acts as a railroad to transport video data from point A, or camera, to point B, which could be VLC Player, RTSP viewers, RTSP Client or other software.
If the camera is not properly secured, users risk their privacy and security. Risks and their importance. Unauthorized access: Poorly protected RTSP cameras can be accessed by anyone with the right URL or software. This may result in unauthorized viewing of live video streams.
Risks and their importance. Unauthorized access: Poorly protected RTSP cameras can be accessed by anyone with the right URL or software. This may result in unauthorized viewing of live video streams.
Privacy Concerns: Exposed cameras could capture sensitive or private information, leading to privacy violations if accessed by unauthorized persons. The possibility of unauthorized access to live video streams undermines people's trust in surveillance systems designed to improve security.
Network vulnerabilities and breaches: In some cases, exploiting an exposed camera could give attackers a foothold in the network, potentially allowing them to launch further attacks or gain access to other devices connected to the same network.
A vulnerability in one device can have cascading effects across an entire network. Data Interception: Attackers can intercept unencrypted RTSP transmissions, allowing them to capture video data and potentially manipulate or alter the footage.
Use encryption with strong credentials.
To ensure the security of RTSP cameras, separation and encryption are the two strategies researchers recommend, along with strong credentials.
First, it's a good rule of thumb to make sure all cameras are connected to a separate protected subnet with end-to-end encryption, or WPA2 (Wi-Fi Protected Access 2), if the network is wireless.
Use encryption mechanisms to secure communication between the camera and the display client. A virtual private network (VPN) is preferred for remote access.
Make sure RTSP cameras require strong, unique passwords for access.
Using default or weak passwords is a common mistake that can easily lead to unauthorized access.
Keep camera firmware updated to address security vulnerabilities and improve overall system security.
Implement access controls to limit who can view camera feeds. This could involve using an IP whitelist or a VPN for remote access.
Consider moving to protocols that provide encryption, such as HTTPS.
“The importance of exposed RTSP cameras extends beyond technical vulnerabilities and touches on fundamental principles of privacy, security, ethics, and trust. Addressing this issue is essential not only to protect digital assets but also to defend the rights and values that underpin modern society.”


