fbpx

The maker of budget-friendly doorbell cameras has addressed security vulnerabilities, thereby improving user privacy safeguards against possible surveillance.

The maker of budget-friendly doorbell cameras has addressed security vulnerabilities, thereby improving user privacy safeguards against possible surveillance.## Eken Group Addresses Security Vulnerabilities in Affordable Doorbell Cameras

Eken Group, a well-known producer of inexpensive doorbell cameras, has reportedly released a firmware update to rectify severe security vulnerabilities in its products, as initially discovered by a Consumer Reports probe earlier this year.

The Security Vulnerabilities

The cameras in question, which are linked to the Aiwit application, are marketed under various brand names, inclusive of Eken, Tuck, Fishbot, Rakeblue, Andoe, Gemee, and Luckwolf. Consumer Reports found during its assessments that the unencrypted cameras could reveal private information like home IP addresses and Wi-Fi networks. More worryingly, external entities could hypothetically view images from a camera’s feed using its serial number.

The Firmware Revision

In reaction to these results, Eken Group has issued a firmware revision that supposedly rectifies these security problems. Devices from the brands listed above should now show a firmware version of 2.4.1 or above, signifying that they have received the update. Although Consumer Reports confirms that its test samples received the update automatically, it recommends users to verify their settings due to the possible risks.

Withdrawn Products

Eken also informed Consumer Reports that two doorbell cameras that had been labeled “Don’t Buy” — the Eken Smart Video Doorbell and Tuck Sharkpop Doorbell Camera — have been withdrawn from the market.

Future Adherence to FCC Regulations

These doorbell cameras were formerly sold on popular online retail platforms, including Amazon, Walmart, and Temu. However, they seemingly have been removed due to the lack of the proper labeling demanded by the Federal Communications Commission (FCC). Looking ahead, Eken Group has pledged to append these IDs to new products to ensure adherence to FCC rules.

Consumer Reports’ Reaction

After testing the update, Consumer Reports has eliminated the warning labels from its scorecards, indicating a positive reaction to Eken Group’s efforts to rectify these security vulnerabilities.

Conclusion

Eken Group’s immediate action addressing the security vulnerabilities discovered in its affordable doorbell cameras marks a step in the right direction towards intensifying user privacy protection. By deploying a firmware update, removing problematic products, and pledging future adherence to FCC rules, the company demonstrates its commitment to handle potential espionage risks and ensure user safety.

Q&A

Q: What were the security vulnerabilities in Eken Group’s doorbell cameras?

A: The cameras weren’t encrypted and could divulge confidential information such as home IP addresses and Wi-Fi networks. Additionally, they permitted outside entities to view images from a camera’s feed using its serial number.

Q: How has Eken Group rectified these security vulnerabilities?

A: Eken Group has deployed a firmware revision to address these problems. Devices should now exhibit a firmware version of 2.4.1 or above, indicating they’ve received the update.

Q: What will Eken Group do to ensure future adherence to FCC rules?

A: The company pledges to append the appropriate IDs demanded by the FCC to new products moving forward.

Q: What was Consumer Reports’ reaction to the firmware revision?

A: After testing the revision, Consumer Reports removed the caution labels from its scorecards, suggesting that the security issues have been addressed.