CVE-2024-52327

6.5 MEDIUM

📋 TL;DR

This vulnerability allows authenticated attackers to bypass the PIN protection on ECOVACS robot lawnmowers and vacuums, enabling unauthorized access to live video feeds. It affects users of ECOVACS cloud-connected robotic devices who rely on PIN protection for video privacy. The bypass occurs through the cloud service interface rather than local device access.

💻 Affected Systems

Products:
  • ECOVACS robot lawnmowers
  • ECOVACS robot vacuums with camera functionality
Versions: All versions prior to cloud service updates in December 2024
Operating Systems: Embedded firmware on ECOVACS devices
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects devices with camera functionality and PIN protection enabled. Requires cloud service connectivity.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could monitor private spaces via live video feeds, potentially capturing sensitive activities, personal information, or home layouts for physical security threats.

🟠

Likely Case

Unauthorized viewing of indoor/outdoor spaces where ECOVACS devices operate, violating privacy expectations of users who enabled PIN protection.

🟢

If Mitigated

Limited to authenticated users only, preventing completely anonymous attacks but still allowing account-compromised attackers to bypass additional security layers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access to the cloud service. Public research presentations demonstrate the bypass technique.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Cloud service updates implemented December 2024

Vendor Advisory: https://www.ecovacs.com/global/userhelp/dsa20241217002

Restart Required: No

Instructions:

1. Ensure ECOVACS app is updated to latest version. 2. Cloud-side fixes are automatically applied when devices connect. 3. No device firmware update required for this specific cloud service vulnerability.

🔧 Temporary Workarounds

Disable cloud connectivity

all

Prevent device from connecting to ECOVACS cloud services to eliminate remote exploitation vector

Disable in ECOVACS app settings or block device internet access at router

Disable camera/PIN features

all

Turn off camera functionality or remove PIN protection if not essential

Configure in ECOVACS app under device settings

🧯 If You Can't Patch

  • Segment IoT devices on separate network VLAN without internet access
  • Implement strong authentication for ECOVACS accounts with MFA if supported

🔍 How to Verify

Check if Vulnerable:

Test if PIN bypass is possible by attempting to access live video feed without entering PIN while authenticated

Check Version:

Check ECOVACS app version in app store/device settings

Verify Fix Applied:

Verify PIN prompt appears and blocks video access when PIN is not entered correctly

📡 Detection & Monitoring

Log Indicators:

  • Multiple failed PIN attempts followed by successful video access
  • Video access logs without corresponding PIN validation

Network Indicators:

  • Unusual video streaming patterns to unexpected IP addresses
  • Cloud API calls bypassing PIN validation endpoints

SIEM Query:

source="ecovacs-cloud" AND (event="video_access" AND NOT event="pin_validated")

🔗 References

📤 Share & Export