It has been reported that new research from Kaspersky Lab, released today, has highlighted vulnerabilities in smart home hubs across millions of UK homes. Researchers discovered that the hub sends user data when it communicates with a server, including the login credentials needed to sign in into the web interface of the smart hub. Remote attackers can then download the archive with this information by sending a legitimate request to the server that also includes the device’s serial number. Christopher Littlejohns, EMEA Manager at Synopsys commented below.
Christopher Littlejohns, EMEA Manager at Synopsys:
- User and company sponsored publication of credentials on publicly accessible sites
- Poor credential mechanisms that include guessable device ids
- Using legacy encryption techniques that are readily crackable using brute force techniques
- Passing data over htttp rather than https
All of these issues demonstrate a lack of threat awareness or analysis; they are fundamental design issues that creates readily exploitable vulnerabilities. This is a recurring theme for small and larger companies for whom speed to market is the primary goal. Companies that do not “build security in” as part of their development processes will suffer the consequences of brand damaging reports like this, or worse – they will likely go out of business.”
The opinions expressed in this post belongs to the individual contributors and do not necessarily reflect the views of Information Security Buzz.