Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security IOS Operating Systems Privacy Software Apple Hardware Technology

Zero-Day iOS HomeKit Vulnerability Allowed Remote Access To Smart Accessories Including Locks (9to5mac.com) 39

Apple has issued a fix to a vulnerability that allowed unauthorized control of accessories, including smart locks and garage door openers. "Our understanding is Apple has rolled out a server-side fix that now prevents unauthorized access from occurring while limiting some functionality, and an update to iOS 11.2 coming next week will restore that full functionality," reports 9to5Mac. From the report: The vulnerability, which we won't describe in detail and was difficult to reproduce, allowed unauthorized control of HomeKit-connected accessories including smart lights, thermostats, and plugs. The most serious ramification of this vulnerability prior to the fix is unauthorized remote control of smart locks and connected garage door openers, the former of which was demonstrated to 9to5Mac. The issue was not with smart home products individually but instead with the HomeKit framework itself that connects products from various companies. The vulnerability required at least one iPhone or iPad on iOS 11.2, the latest version of Apple's mobile operating system, connected to the HomeKit user's iCloud account; earlier versions of iOS were not affected.
This discussion has been archived. No new comments can be posted.

Zero-Day iOS HomeKit Vulnerability Allowed Remote Access To Smart Accessories Including Locks

Comments Filter:
  • smart (Score:5, Insightful)

    by Neuronwelder ( 990842 ) on Friday December 08, 2017 @07:56PM (#55704561)
    Why do they use the word "smart" when using the public Web to control a private home?
    • Any company that can convince people to put the control of their lives into the hands of the public has to be pretty fucking smart, at least smarter than the actual purchaser.
    • by ls671 ( 1122017 )

      Thanks, I couldn't believe my understanding of TFS but you seem to confirm it was correct.

  • by Anonymous Coward

    According to the article, Apple was informed of the vulnerability in October and won't be releasing a patch until next week. The patch is only coming out that "soon" because 9to5Mac is reporting on it, much like the "empty password for root" bug was reported to them weeks ago but only fixed when it went "viral" on Twitter.

    It's clear that Apple is taking Microsoft's stance of security from the 90s: they don't care about it.

    • Re: (Score:3, Informative)

      by Hal_Porter ( 817932 )

      Apple have never really taken security seriously. Remember how when iPhones came out Apple fans claimed Apple was more secure and also that the iPhone being locked down wasn't a problem because you could jailbreak it by visiting a site with a malformed TIFF [wikipedia.org]?

      This was in 2007, five years after Microsoft's focus on security initiative. [neowin.net]

      • by Anonymous Coward

        hal porter doesn't even take the history of company security seriously. He just dislikes apple, given his comment history anyone can see that. The truth is few take security at all seriously.

      • by ls671 ( 1122017 )

        Apple have never really taken security seriously...

        I am not trying to defend apple here since there is no excuse but seriously, very few people take security seriously nowadays even where one would expect people in charge of a given organization to do so.

        I remember a default value for an organization field being "not_organized" somewhere, I think it was in certificate requests but I am not sure ;-)

        In a technologically advanced society, maybe IT security topic knowledge should be made mandatory before going to high school.

      • Remember how when iPhones came out Apple fans claimed Apple was more secure and also that the iPhone being locked down wasn't a problem because you could jailbreak it by visiting a site with a malformed TIFF

        And almost 10 years after that, Android phones were shipping with a vulnerability in the media framework, which ran in a separate process with root privilege (WTF?!?) that allowed any web site to run malicious code as root and then compromise the kernel. And it took over six months between the vulnerability being made public (and even given the buzzwordy name StageFright) and more than 50% of Android phones being patched, in spite of the Android developers having the experience of the iOS vulnerability to

    • by tlhIngan ( 30335 )

      According to the article, Apple was informed of the vulnerability in October and won't be releasing a patch until next week. The patch is only coming out that "soon" because 9to5Mac is reporting on it, much like the "empty password for root" bug was reported to them weeks ago but only fixed when it went "viral" on Twitter.

      Only if you want to misreport it as "a patch to fix it".

      No, it's fixed already. You cannot exploit this. The fixes were applied all over the place - a lot of patches were applied to Apple'

  • Is damn good reason enough to NOT use these things in your home, unless your family safety means jack shit.

    • by ls671 ( 1122017 )

      No, no, it is a very good technology when you know what you are doing. Contact me offline for further requests,
      I run an hyper-Z omega secretive cloud that will take care of all your security needs, 100% hacker proof, guaranteed! We are also fully compatible with all the Apple apps!

      • I run an hyper-Z omega secretive cloud that will take care of all your security needs, 100% hacker proof, guaranteed!

        Can I upgrade to the 120% hacker-proof version for an extra $100??

  • Those who were defending amazon.com's hardware+service to allow amazon.com to deliver items inside your home should remember this: software you don't exclusively control, can't vet, and aren't allowed to inspect, fix, or share (thus your willingness to do these things is moot) means you're not just trusting an unknowable number of people to open your door and do stuff in your home while everyone is away. Your home security and your privacy is also subject to security problems anywhere in the amazon.com syst

    • Not being able to vet it doesn't mean much. I doubt that there are 100 people in the world who can audit software of this complexity and be confident that it is free from security bugs. For anyone else, it should be assumed to be insecure whether you have the code or not.
    • by tlhIngan ( 30335 )

      Those who were defending amazon.com's hardware+service to allow amazon.com to deliver items inside your home should remember this: software you don't exclusively control, can't vet, and aren't allowed to inspect, fix, or share (thus your willingness to do these things is moot) means you're not just trusting an unknowable number of people to open your door and do stuff in your home while everyone is away. Your home security and your privacy is also subject to security problems anywhere in the amazon.com syst

  • by crimson tsunami ( 3395179 ) on Saturday December 09, 2017 @10:17AM (#55706225)
    Do you just walk up to the front door and say you are Root?
    Or is there a handle you have to hold wrong first?
  • IoT shit is insecure? Nooooooooo!

    Shocking, I say! For further proof, this is my shocked face.

As you will see, I told them, in no uncertain terms, to see Figure one. -- Dave "First Strike" Pare

Working...