Article Details

Scrape Timestamp (UTC): 2025-08-09 19:06:17.114

Source: https://thehackernews.com/2025/08/linux-based-lenovo-webcams-flaw-can-be.html

Original Article Text

Click to Toggle View

Linux-Based Lenovo Webcams' Flaw Can Be Remotely Exploited for BadUSB Attacks. Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices. "This allows remote attackers to inject keystrokes covertly and launch attacks independent of the host operating system," Eclypsium researchers Paul Asadoorian, Mickey Shkatov, and Jesse Michael said in a report shared with The Hacker News. The vulnerabilities have been codenamed BadCam by the firmware security company. The findings were presented at the DEF CON 33 security conference today. The development likely marks the first time it has been demonstrated that threat actors who gain control of a Linux-based USB peripheral that's already attached to a computer can be weaponized for malicious intent. In a hypothetical attack scenario, an adversary can take advantage of the vulnerability to send a victim a backdoored webcam, or attach it to a computer if they are able to secure physical access, and remotely issue commands to compromise a computer in order to carry out post-exploitation activity. BadUSB, first demonstrated over a decade ago by security researchers Karsten Nohl and Jakob Lell at the 2014 Black Hat conference, is an attack that exploits an inherent vulnerability in USB firmware, essentially reprogramming it to discreetly execute commands or run malicious programs on the victim's computer. "Unlike traditional malware, which lives in the file system and can often be detected by antivirus tools, BadUSB lives in the firmware layer," Ivanti notes in an explanation of the threat published late last month. "Once connected to a computer, a BadUSB device can: Emulate a keyboard to type malicious commands, install back doors or keyloggers, redirect internet traffic, [and] exfiltrate sensitive data." In recent years, Google-owned Mandiant and the U.S. Federal Bureau of Investigation (FBI) have warned that the financially motivated threat group tracked as FIN7 has resorted to mailing U.S.-based organizations "BadUSB" malicious USB devices to deliver a malware called DICELOADER. The latest discovery from Eclypsium shows that a USB-based peripheral, such as webcams running Linux, that was not initially intended to be malicious, can be a vector for a BadUSB attack, marking a significant escalation. Specifically, it has been found that such devices can be remotely hijacked and transformed into BadUSB devices without ever being physically unplugged or replaced. "An attacker who gains remote code execution on a system can reflash the firmware of an attached Linux-powered webcam, repurposing it to behave as a malicious HID or to emulate additional USB devices," the researchers explained. "Once weaponized, the seemingly innocuous webcam can inject keystrokes, deliver malicious payloads, or serve as a foothold for deeper persistence, all while maintaining the outward appearance and core functionality of a standard camera." Furthermore, threat actors with the ability to modify the firmware of the webcam can achieve a greater level of persistence, allowing them to re-infect the victim computer with malware even after it has been wiped and the operating system is reinstalled. The vulnerabilities uncovered in Lenovo 510 FHD and Lenovo Performance FHD webcams relate to how the devices do not validate firmware, as a result of which they are susceptible to a complete compromise of the camera software via BadUSB-style attacks, given that they run Linux with USB Gadget support. Following responsible disclosure with Lenovo in April 2025, the PC manufacturer has released firmware updates (version 4.8.0) to mitigate the vulnerabilities and has worked with the Chinese company SigmaStar to release a tool that plugs the issue. "This first-of-its-kind attack highlights a subtle but deeply problematic vector: enterprise and consumer computers often trust their internal and external peripherals, even when those peripherals are capable of running their own operating systems and accepting remote instructions," Eclypsium said. "In the context of Linux webcams, unsigned or poorly protected firmware allows an attacker to subvert not just the host but also any future hosts the camera connects to, propagating the infection and sidestepping traditional controls."

Daily Brief Summary

VULNERABILITIES // Lenovo Webcams Vulnerable to Remote BadUSB Exploits, Firmware Updates Released

Eclypsium researchers disclosed vulnerabilities in Lenovo 510 FHD and Performance FHD webcams, allowing remote attackers to exploit them as BadUSB devices.

The vulnerabilities enable attackers to inject keystrokes and execute commands, bypassing traditional malware detection due to the attack's firmware-level nature.

This marks a significant escalation in BadUSB threats, as Linux-based USB peripherals can now be remotely hijacked without physical access.

Lenovo has responded by releasing firmware updates (version 4.8.0) and collaborated with SigmaStar to provide a tool addressing these security flaws.

The vulnerabilities stem from the webcams' failure to validate firmware, exposing them to complete software compromise.

The attack vector poses a risk to enterprise and consumer systems, as peripherals often run their own operating systems and accept remote commands.

Organizations are urged to apply the firmware updates promptly to mitigate potential exploitation and enhance device security.