Photo credit: engagor.com |
In a new report released by enterprise security firm Veracode,
researchers discovered during testing of common, household IoT devices
that security is not up to scratch -- paving the way for exploits, data
theft, robbery and potentially even stalking.
IoT devices have
exploded in popularity in recent years, with major tech firms and
startups alike pouring funds into developing devices ranging from smart
home security systems to sensor-laden fridges and mood lighting. It is
estimated that by 2020, 25 billion connected devices
-- including IoT products -- will be in use worldwide. While such
products appeal to the market and can make daily living more convenient,
security remains a hot topic. A quick search online and you can find
default passwords for many IoT devices -- often left unchanged or unable
to be changed by owners -- and very limited protections are often put
in place.
According to Veracode, the problem still stands. In a
security case study, the firm's team analyzed and monitored always-on
IoT devices in order to understand the real-world impact of IoT product
security. Six common household IoT devices, detailed below, were
examined:
- Chamberlain MyQ Internet Gateway: Internet-based remote control of garage doors.
- Chamberlain MyQ Garage: Internet-based remote control of garage doors, interior switches, and electrical outlets.
- SmartThings Hub: A central control device for home automaton sensors, switches and door locks.
- Ubi: The Unified Computer Intelligence Corporation is an always-on, voice-controlled device for answering questions, controlling home automaton and performing tasks such as sending emails and SMS messages.
- Wink Hub: A central control device for home automation products.
- Wink Relay: A combination hub and control device for home automation sensors and products.
All of these products were scrutinized by the company and the team
found that the impact of security vulnerabilities found in these
products could be "significant" for users.
Purchased new in late December last year
with up-to-date firmware, the devices were tested across four different
domains: user-facing cloud services, back-end cloud services, mobile
application interfaces, and device debugging interfaces.
To
begin with, when testing the devices and their security in the
user-facing cloud service arena, the team covered authentication and
communication with cloud services that are directly accessible by users,
whether they be through a web browser, custom embedded device or mobile
application. Veracode wanted to know whether the service allowed
communication to be protected through strong cryptography, whether
encryption was a requirement at all, if strong passwords were enforced
and whether server TLS certificates were properly validated.
If a product failed in these tests, this could
lead to data theft, product hijacking, cracked passwords or
man-in-the-middle (MITM) attacks.
The results are below:
The second test performed looked at back-end cloud services. The
security team asked whether the devices used strong authentication
mechanism to identify themselves to cloud services, whether encryption
was employed, whether safeguards were in place to prevent MITM attacks
and if sensitive data was protected. If a device failed in these tests,
this could lead to impersonation by attackers, MITM attacks, the passive
monitoring of networks in order to monitor devices and steal data such
as user credentials.
The third test, concerning mobile applications and IoT devices that
directly communicate with them, explored whether sensitive data was
protected and encrypted, as well as the employment of certificate
validation protocols. Without the correct protection, data can be stolen
and MITM attacks performed.
In the final test, Veracode explored device debugging interfaces and
services which run on the IoT device but are not intended to be used by
end users -- varying from debugging ports to service code. The team
chose to report only on interfaces that are accessible over a network,
whether this be LAN-based or through the Web. The security team explored
whether "hidden" service access was restricted to users with physical
access to the device, if open interfaces are protected against
unauthorized access, and whether open interfaces are designed to prevent
an attacker who gains access from running arbitrary code on the device.
If a device performed badly in these tests, that could lead to
unauthorized access, hijacking, sensitive information leaks and remote
code execution.
The range of security issues discovered in these devices is
concerning, especially as IoT devices become more widely adopted in
today's homes. As the security team puts it:
"Leveraging
information from Ubi could enable cybercriminals to know exactly when to
expect a user to be home based on when there is an increase in ambient
noise or light in the room, which could facilitate a robbery, or even
stalking in the case of a celebrity or an angry ex.
Taking
advantage of security vulnerabilities within a Wink Relay or Ubi device,
cybercriminals could turn the microphones on and listen to any
conversations within earshot of the device, supporting blackmail efforts
or capturing business intelligence from a user's employer in the case
of a home office. Applying vulnerabilities found in the Chamberlain MyQ
system, thieves could be notified when a garage door is opened or
closed, indicating a window of opportunity to rob the house."
Brandon Creighton, Veracode Security Research Architect commented:
"It's hard to not be excited about what the IoT has enabled and will bring in the future, although that doesn't mean cybersecurity should be sacrificed in the process. We need to look at the IoT holistically to ensure that the devices, as well as their web and mobile applications and back-end cloud services, are built securely from their inception. Security should not be treated as an afterthought or add-on, or we risk putting our personal information in jeopardy or even opening the door to physical harm."Written By; By Charlie Osborne
source; zdnet.com
No comments:
Post a Comment