Here is an article where you can read more: https://foundation.mozilla.org/en/blog/mozilla-publishes-ring-doorbell-vulnerability-following-amazons-apathy/

Quoted a portion:

(SAN FRANCISCO, CA | TUESDAY, JUNE 6, 2023) – Today, Mozilla is publicizing a security vulnerability in Amazon’s Ring Wireless Video Doorbell. Mozilla shared the vulnerability with Amazon over 90 days ago, but Amazon has yet to address the issue. Now, per industry standards, Mozilla is sharing its findings publicly to alert Ring Doorbell users and to further pressure Amazon to take action.

Following a penetration test of the Ring Doorbell conducted in October-November 2022, Mozilla and collaborator Cure53 determined that the device is vulnerable to Wi-Fi deauthentication attacks. Bad actors can leverage these weaknesses to disconnect the device from the internet using easily-accessible tools.

As a result, those bad actors could take the doorbell offline and then have their activities go unrecorded — undermining the product’s core purpose. Even after the doorbell is reconnected to the internet, a user will receive no alert about the attack.

Mozilla’s disclosure comes just days after Ring’s $5.8 million settlement with the Federal Trade Commission (FTC) over other serious privacy and security issues. The FTC found that “Ring’s poor privacy and lax security let employees spy on customers through their cameras, including those in their bedrooms or bathrooms, and made customers’ videos, including videos of kids, vulnerable to online attackers.”

  • @bbbbb
    link
    English
    21 year ago

    Ring and Blink are designed differently and run different hardware. However, I would guess that some Blink devices have the same issue. I might be wrong but I think all 2.4 GHz Wi-Fi is vulnerable to deauth

    • @ShunkW
      link
      English
      31 year ago

      5ghz is also susceptible to deauth.

    • Danny M
      link
      fedilink
      English
      11 year ago

      it’s not about the frequency, it’s about the protocol. both 2.4 GHz and 5GHz are vulnerable with WPA2 (or worse WEP). WPA3 is not vulnerable