Menu

M2M FEATURE NEWS

WeMo Vulnerabilities Latest Example of IoT Security Risks

By Rachel Ramsey February 19, 2014

Just as with the growth of smartphones, the increasing number of Internet-connected devices presents opportunities for hackers and security risks.

The “Internet of Hackable Things” has already exposed vulnerabilities in IoT devices, including baby monitors, LED lights, TVs and refrigerators. The growing number of connected devices means there is more intersection of networks, devices, operating systems, vendors, applications and commands, making it harder to control and easier to attack. An IOActive security advisory recently revealed vulnerabilities in Belkin WeMo products and devices built on the WeMo firmware. The security researchers are advising people to stop using these products because attackers can take control of home networks, thermostats or other connected devices.

WeMo is a family of products that allow users to control home electronics from anywhere via a smartphone and home Wi-Fi and mobile Internet. It powers the idea of home automation, where walking into a room can trigger a light switch, walking out can turn a lamp off, and users can control their heat, air conditioning and more when they’re not even in their home. It also integrates with If This Then That (IFTTT), an application that allows users to build “recipes,” or customized notifications and triggers. For example, if a sensor at the front door is triggered, then you will receive an email. Or if the sun sets, then the hallway lamp goes on.

Those are examples of how the Internet of Things will change many parts of everyday lives, reducing costs, saving time and improving productivity. However, with this convenience comes a cost.

The advisory recommends against using these devices because they pose a threat for multiple part of users’ lives. Hackers can remotely power on or off devices, which could mean unnoticed fires or wasted electricity. They can also remotely monitor whether people are in a home, or use the WeMo devices as a gateway to hack into other devices.

Mike Davis, principal research scientist for IOActive, explained that “too much connectivity and too many ‘smart’ features” are among the biggest threats from the IoT.

“When you give a device software control of real world items, they become a tempting target. And without real security engineering and testing, it is a disaster waiting to happen (or at least a house fire or two),” he said.

To prevent hackers or data breaches, Davis recommends performing a security assessment and penetration test. This should also be repeated when new features are added to ensure security.

There are basically four vulnerabilities that make these situations possible for attackers:

  • The Belkin WeMo firmware images used to update the devices are signed with public key encryption to protect against unauthorized modifications. However, the signing key and password are leaked on the firmware that is already installed on the deivces, so attackers can use the same key and password to sign their own malicious firmware and bypass security checks.
  • WeMo devices do not validate Secure Socket Layer (SSL) certificates preventing them from validating communications with Belkin’s cloud service. Attackers can use any SSL certificate to impersonate Belkin’s cloud services and push malicious firmware updates and capture credentials at the same time.
  • The Internet communication infrastructure used for WeMo devices to communicate I based on an abused protocol designed for VoIP services to bypass firewall or NAT restrictions. This compromised all WeMo devices security by creating a virtual WeMo “darknet” where all WeMo devices can be connected to directly and controlled even without the firmware update attack.
  • The Belkin WeMo server application programming interface (API) was also found to be vulnerable to an XML inclusion vulnerability, which would allow attackers to compromise all WeMo devices.

“My hope is that the average user would be more careful about selecting Internet-connected products,” Davis said. “Maybe controlling your heater from your smartphone is a bad idea - maybe you should just get out of bed to start that pot of coffee.  I think we’re in a real danger of the market being flooded with poorly designed products, and with no real security plan, just because its ‘cool’ and has a pretty app.”

IOActive provides software, hardware and some compliance testing and review for its customers. Usually this is a process that happens just prior to product release, or in many case as part of the product design lifecycle. The company’s security services also specialize in smart grid technologies, software assurance and compliance. Learn more at www.ioactive.com




Edited by Cassandra Tucker
Get stories like this delivered straight to your inbox. [Free eNews Subscription]

Content Director

SHARE THIS ARTICLE
Related Articles

Beyond the Closet, Connecting to IoT

By: Gary Audin    11/11/2020

Two challenges arise when considering cable based IoT.

Read More

Banyan Security Enhances Secure Remote Access for Engineering Resources

By: Ken Briodagh    10/27/2020

Banyan's Continuous Authorization Can Grant or Revoke Access to Sensitive Engineering Environments and Applications in Real-time Based on TrustScore

Read More

Senet Eyes RAN Partnerships as Key to Delivering Network Services for Massive IoT

By: Arti Loftus    10/21/2020

To meet the challenges that come with providing network connectivity for IoT solutions, Senet is executing a strategy for massive IoT that will be bui…

Read More

mimik Selected by 5G Open Innovation Lab to Drive Early Adoption of 5G

By: Ken Briodagh    10/15/2020

mimik's patented Hybrid Edge Cloud platform will boost the performance and reduce the cost of 5G Networks

Read More

5G Sets New Standards for Vertical Industries' IoT Connectivity

By: Special Guest    10/13/2020

As 5G rolls out across the world, vertical industries across IoT are working on additional standards to make the technology suitable for their industr…

Read More