At Christmas, people like to give away technical gadgets. But what many people don't realize is that these products have countless security vulnerabilities that attackers use to access private networks, steal data or incorporate hijacked devices into their botnets.
Once again this year, many technical devices such as interactive toys, smart household appliances or networked consumer electronics will be under the Christmas tree. The security experts at IoT Inspector took this as an opportunity to take a closer look at popular items from well-known manufacturers (including those from the USA and Germany). The shocking result: they found a total of over 7,000 vulnerabilities!
In most cases, outdated software with known vulnerabilities was used, sometimes even in the latest firmware version. However, the investigation also identified previously unknown vulnerabilities, which the experts reported to the manufacturers.
Gateway for cybercriminals
The specialists also found defective maintenance access points that allow attackers to remotely control the device. Through this, in the worst case, the devices can spy on their owners or be used as a weapon for attacks on further targets. Many devices did not even comply with basic security measures: For example, manufacturers sometimes used unencrypted transport paths for their firmware updates. Cybercriminals are thus able to redirect data traffic and inject malware into the devices.
Some devices also stored the user's WiFi password in plain text. In combination with other vulnerabilities, this makes it easy to read the password, and attackers could gain unauthorized access as a result. These are all typical reasons why IoT device vulnerabilities are now one of the main gateways for attackers.
These devices were reviewed
When selecting the devices to be examined, IoT Inspector's security experts attached great importance to not only considering no-name cheap products, but to showing that the dangers also lurk in products from reputable companies. The following gadgets were tested:
The demand of the experts, especially addressed to the manufacturers of IoT devices, is therefore clear: The security of devices must definitely be considered from the outset and implemented consistently.
Tips for the safe handling of electronic devices
In principle, caution should be exercised with IoT devices and a separate network segment should be set up for them. In addition, buyers of technical devices should take the following tips to heart: