toggle

AAPL Stock: 122.99 ( -0.39 )

Printed from http://www.macnn.com

Security flaw found in Belkin WeMo home automation line

updated 03:27 pm EST, Tue February 18, 2014

Entire line vulnerable, no fix currently available from Belkin

Security specialist IOActive announced today that it has uncovered multiple vulnerabilities in Belkin WeMo Home Automation devices that could affect over half a million users. The password leak allows miscreants to remotely control WeMo devices, perform malicious firmware updates, and access an internal home network.

The Belkin WeMo firmware images that are used to update the devices are signed with public key encryption to protect against unauthorised modifications. However, the signing key and password are leaked on the firmware that is already installed on the devices. This allows attackers to use the same signing key and password to sign their own malicious firmware and bypass security checks during the firmware update process.

Additionally, Belkin WeMo devices do not validate Secure Socket Layer (SSL) certificates -- preventing them from validating communications with Belkin's cloud service including the firmware update RSS feed. This allows attackers to use any SSL certificate to impersonate Belkin's cloud services, and push malicious firmware updates and capture credentials at the same time. Due to the cloud integration, the firmware update is pushed to the victim's home regardless of which paired device receives the update notification or its physical location.

The Internet communication infrastructure used to communicate with Belkin WeMo devices is based on an abused protocol that was designed for use by Voice over Internet Protocol (VoIP) services to bypass firewall or NAT restrictions. It does this in a way that compromises all WeMo devices security by creating a virtual WeMo 'darknet' where all WeMo devices can be connected to directly. Also, the Belkin WeMo server application programming interface (API) was also found to be vulnerable to an XML inclusion vulnerability, which would allow attackers to compromise all WeMo devices.

Given the number of WeMo devices in use, it is likely that many of the attached appliances and devices will be unattended, thus increasing the threat posed by these vulnerabilities. Additionally, once an attacker has established a connection to a WeMo device within a victims network, the device can be used as a foothold to attack other devices -- such as laptops, mobile phones, and attached network file storage.

Belkin has been informed of the findings by the research company. No fix is currently available.




by MacNN Staff

POST TOOLS:

TAGS :

toggle

Comments

  1. sammaffei

    Fresh-Faced Recruit

    Joined: 09-04-04

    Right, but if lock down your network properly, this shouldn't happen. If they get into your network to upload firmware to your WeMo, they already have access to laptops and what not. Also, WeMo doesn't auto install firmware. You are asked to do it, so check to see if it's valid on the web before installing it. Sure, they should be more secure, but it's not the apocalyptic scenario that's depicted here.

Login Here

Not a member of the MacNN forums? Register now for free.

toggle

Network Headlines

Follow us on Facebook

toggle

Most Popular

Advertisement

Recent Reviews

15-inch MacBook Pro with Force Touch

Apple's 15-inch Retina MacBook Pro continues to be a popular notebook with professional users and prosumers looking for the ultimate ...

Typo keyboard for iPad

Following numerous legal shenanigans between Typo -- a company founded in part by Ryan Seacrest -- and the clear object of his physica ...

Entry-level 27-inch Retina iMac

The 27-inch Apple iMac with 5K Retina display is already one of the best value-for-money Macs that Apple has ever released. It was som ...

toggle

Most Commented