Certain Lenovo Webcams Vulnerable to Remote Firmware Attacks

Cybersecurity researchers from Eclypsium in recent analysis have uncovered a serious vulnerability affecting certain Lenovo webcams that run on Linux-based firmware. This flaw allows an attacker with remote access to reflash the device’s firmware, turning it into a covert attack tool capable of injecting keystrokes or establishing persistent backdoors — all without physical access.

The affected webcams, including models like the Lenovo 510 FHD and Performance FHD, are built on SigmaStar’s SSC9351D chip. These devices support Linux and can emulate various USB peripherals thanks to the USB gadget feature. This flexibility, however, comes with a risk: the firmware update process does not verify the authenticity of the firmware being installed.

If an attacker gains remote control over the host system, they can exploit simple USB commands such as erasing and rewriting the firmware to install malicious code onto the webcam. Once infected, the device can act as a Human Interface Device (HID), issuing keystrokes or commands without detection.

Most alarming is how this malicious firmware persists even if the computer is wiped or the operating system is reinstalled, making it a powerful, stealthy persistence mechanism.

In response to these findings reported by Eclypsium, Lenovo has released new firmware versions for the following cams:

  • Lenovo 510 FHD Webcam: Version 4.8.0
  • Lenovo Performance FHD Webcam: Version 4.8.0

These updates introduce critical security improvements, primarily by implementing cryptographic signature validation. This means the firmware can no longer be overwritten with malicious code unless it is properly signed by Lenovo, drastically reducing the risk of remote reflashing attacks.

To update, visit Lenovo’s official support website on support.lenovo.com, or their official support center updates page.
Search for your specific webcam model and download then install the latest firmware version (4.8.0 or newer).

Why This Matters
This vulnerability underscores how critical firmware integrity can be. Devices that do not verify firmware signatures are vulnerable to remote tampering, which can lead to espionage, data theft, or broader network compromise.

Secure update practices, including cryptographic signing, implemented by manufacturers is also important to prevent malicious firmware from being installed.

Along with updating, other recommendations include:

Limit physical and remote access to USB ports, especially in sensitive environments.
Monitor connected devices for unusual activity.
Advocate for hardware vendors to implement stronger security measures, including firmware signing and secure update protocols.

As peripherals become more sophisticated and capable of autonomous firmware updates, ensuring their security is essential.


Comments Section

Leave a Reply

Your email address will not be published. Required fields are marked *



,
Back to Top - Modernizing Tech