Internet-connected home security products has become a security issue. Researchers from Bitdefender notified Ring in June of a flaw in Ring Video Doorbell Pro's software that made it possible for wireless eavesdroppers to grab the Wi-Fi credentials from customers during the device's setup-because those credentials were sent to unsecured Wi-Fi connection to the device using unencrypted HTTP.
… the smartphone app [for Ring] must send the wireless network credentials. When entering configuration mode, the device creates an access point without a password (the SSID contains the last three bytes from the MAC address). Once this network is up, the app connects to it automatically, queries the device, then sends the credentials to the local network. All these exchanges are performed through plain HTTP.
An attacker could take advantage of this bug by forcing a victim to reconfigure the doorbell. Wi-Fi device to make the Ring doorbell drop off its network.
The doorbell's The doorbell is offline, which may require the attacker or someone else to ring the doorbell. When the doorbell is put into configuration mode, the app will offer to reconnect the doorbell to the Wi-Fi network and then resend the credentials to the doorbell in an HTTP message encoded in XML.
The attacker would then be able to to connect to the victim's home Wi-Fi network.
All affected devices should be patched now, as long as there are no other security measures in place to stop them. according to Ring and Bitdefender. Wi-Fi networks that restrict access by connected devices to the Internet only. And the attacks can still be stopped using the devices offline-allowing a burglar or "porch pirate" to cover their tracks by disabling video recording.