By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks
Computing

Linux-Based Lenovo Webcams’ Flaw Can Be Remotely Exploited for BadUSB Attacks

News Room
Last updated: 2025/08/09 at 3:02 PM
News Room Published 9 August 2025
Share
SHARE

Aug 09, 2025Ravie LakshmananVulnerability / Hardware Security

Cybersecurity researchers have disclosed vulnerabilities in select model webcams from Lenovo that could turn them into BadUSB attack devices.

“This allows remote attackers to inject keystrokes covertly and launch attacks independent of the host operating system,” Eclypsium researchers Paul Asadoorian, Mickey Shkatov, and Jesse Michael said in a report shared with The Hacker News.

The vulnerabilities have been codenamed BadCam by the firmware security company. The findings were presented at the DEF CON 33 security conference today.

The development likely marks the first time it has been demonstrated that threat actors who gain control of a Linux-based USB peripheral that’s already attached to a computer can be weaponized for malicious intent.

In a hypothetical attack scenario, an adversary can take advantage of the vulnerability to send a victim a backdoored webcam, or attach it to a computer if they are able to secure physical access, and remotely issue commands to compromise a computer in order to carry out post-exploitation activity.

Cybersecurity

BadUSB, first demonstrated over a decade ago by security researchers Karsten Nohl and Jakob Lell at the 2014 Black Hat conference, is an attack that exploits an inherent vulnerability in USB firmware, essentially reprogramming it to discreetly execute commands or run malicious programs on the victim’s computer.

“Unlike traditional malware, which lives in the file system and can often be detected by antivirus tools, BadUSB lives in the firmware layer,” Ivanti notes in an explanation of the threat published late last month. “Once connected to a computer, a BadUSB device can: Emulate a keyboard to type malicious commands, install back doors or keyloggers, redirect internet traffic, [and] exfiltrate sensitive data.”

In recent years, Google-owned Mandiant and the U.S. Federal Bureau of Investigation (FBI) have warned that the financially motivated threat group tracked as FIN7 has resorted to mailing U.S.-based organizations “BadUSB” malicious USB devices to deliver a malware called DICELOADER.

The latest discovery from Eclypsium shows that a USB-based peripheral, such as webcams running Linux, that was not initially intended to be malicious, can be a vector for a BadUSB attack, marking a significant escalation. Specifically, it has been found that such devices can be remotely hijacked and transformed into BadUSB devices without ever being physically unplugged or replaced.

“An attacker who gains remote code execution on a system can reflash the firmware of an attached Linux-powered webcam, repurposing it to behave as a malicious HID or to emulate additional USB devices,” the researchers explained.

“Once weaponized, the seemingly innocuous webcam can inject keystrokes, deliver malicious payloads, or serve as a foothold for deeper persistence, all while maintaining the outward appearance and core functionality of a standard camera.”

Furthermore, threat actors with the ability to modify the firmware of the webcam can achieve a greater level of persistence, allowing them to re-infect the victim computer with malware even after it has been wiped and the operating system is reinstalled.

Identity Security Risk Assessment

The vulnerabilities uncovered in Lenovo 510 FHD and Lenovo Performance FHD webcams relate to how the devices do not validate firmware, as a result of which they are susceptible to a complete compromise of the camera software via BadUSB-style attacks, given that they run Linux with USB Gadget support.

Following responsible disclosure with Lenovo in April 2025, the PC manufacturer has released firmware updates (version 4.8.0) to mitigate the vulnerabilities and has worked with the Chinese company SigmaStar to release a tool that plugs the issue.

“This first-of-its-kind attack highlights a subtle but deeply problematic vector: enterprise and consumer computers often trust their internal and external peripherals, even when those peripherals are capable of running their own operating systems and accepting remote instructions,” Eclypsium said.

“In the context of Linux webcams, unsigned or poorly protected firmware allows an attacker to subvert not just the host but also any future hosts the camera connects to, propagating the infection and sidestepping traditional controls.”

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article New Rust Client Enables Building Safe, High-Performance Apps with Aerospike
Next Article A Special Diamond Is the Key to a Fully Open Source Quantum Sensor
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

7 Warning Signs That Your Car Needs a Battery Replacement
Gadget
Home Depot is selling a ‘sturdy’ privacy fence for just $89.60
News
A battery protected by wood does better than Tesla in the event of a fire
Mobile
The HackerNoon Newsletter: How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks (8/9/2025) | HackerNoon
Computing

You Might also Like

Computing

The HackerNoon Newsletter: How I Set Up a Cowrie Honeypot to Capture Real SSH Attacks (8/9/2025) | HackerNoon

2 Min Read
Computing

WALocker Ransomware: Myanmar’s Civil Service Board Hacked and the data of 200,000 Officials Exposed | HackerNoon

6 Min Read
Computing

From Jock to VP: Using Your Sports Experience to Build a Career | HackerNoon

15 Min Read
Computing

How I Made Next.js and PWA Finally Get Along — With next-pwa-pack | HackerNoon

12 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?