CVE-2024-34896

7.5 HIGH

📋 TL;DR

The Nedis SmartLife Video Doorbell fails to properly terminate peer-to-peer connections, allowing previously connected users to continue accessing live video feeds after disconnection. This affects users of the Nedis SmartLife Video Doorbell (WIFICDP10GY) with the Nedis SmartLife iOS app version 1.4.0.

💻 Affected Systems

Products:
  • Nedis SmartLife Video Doorbell (WIFICDP10GY)
Versions: Nedis SmartLife iOS app v1.4.0
Operating Systems: iOS
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the peer-to-peer connection mechanism between the iOS app and doorbell device.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Unauthorized individuals gain persistent access to live video feeds from doorbell cameras, enabling surveillance of private property and potential identification of residents' comings and goings.

🟠

Likely Case

Previous users or attackers who gained temporary access maintain unauthorized video surveillance capability without the homeowner's knowledge.

🟢

If Mitigated

With proper network segmentation and monitoring, unauthorized access attempts could be detected and blocked before significant privacy violations occur.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires previous legitimate or compromised access to establish initial connection before exploiting the persistence flaw.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown - check vendor for updated app version

Vendor Advisory: http://nedis.com

Restart Required: No

Instructions:

1. Check Nedis website for security updates. 2. Update Nedis SmartLife iOS app through Apple App Store. 3. Ensure doorbell firmware is updated if available. 4. Review and revoke any unauthorized app connections.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate the doorbell on a separate VLAN or guest network to limit lateral movement if compromised.

Connection Monitoring

iOS

Regularly review and manually disconnect all active connections to the doorbell through the app interface.

🧯 If You Can't Patch

  • Disable remote access features and use the doorbell only locally
  • Physically disconnect the device when not in use or replace with a different model

🔍 How to Verify

Check if Vulnerable:

Check if you can access live video feed after disconnecting from the app or if previous users still have access.

Check Version:

Check app version in iOS Settings > [App Name] > Version

Verify Fix Applied:

Test that disconnecting from the app immediately terminates all video feed access for that user.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected persistent connections to doorbell video stream
  • Multiple simultaneous connections from different IPs

Network Indicators:

  • Sustained video streaming traffic after user disconnection
  • Unusual P2P connection patterns

SIEM Query:

Network traffic showing video streaming to previously disconnected IP addresses

🔗 References

📤 Share & Export