Critical Bug Impacting Millions of IoT Devices Lets Hackers Spy On You (bleepingcomputer.com) 42
An anonymous reader quotes a report from BleepingComputer: Security researchers are sounding the alarm on a critical vulnerability affecting tens of millions of devices worldwide connected via ThroughTek's Kalay IoT cloud platform. The security issue impacts products from various manufacturers providing video and surveillance solutions as well as home automation IoT systems that use the Kalay network for easy connectin and communication with a corresponding app. A remote attacker could leverage the bug to gain access to the live audio and video streams, or to take control of the vulnerable device. Researchers at Mandiant's Red Team discovered the vulnerability at the end of 2020 and worked with the U.S. Cybersecurity and Infrastructure Security Agency and ThroughTek to coordinate the disclosure and create mitigation options.
Tracked as CVE-2021-28372, the issue is a device impersonation vulnerability that received a severity score of 9.6 out of 10. It affects the Kalay protocol that is implemented as a software development kit (SDK) that is built into mobile and desktop applications. Mandiant's Jake Valletta, Erik Barzdukas, and Dillon Franke looked at ThroughTek's Kalay protocol and found that registering a device on the Kalay network required only the device's unique identifier (UID). Following this lead, the researchers discovered that a Kalay client, such as a mobile app, usually receives the UID from a web API hosted by the vendor of the IoT device. An attacker with the UID of a target system could register on the Kalay network a device they control and receive all client connection attempts. This would allow them to obtain the login credentials that provide remote access to the victim device audio-video data. The researchers say that this type of access combined with vulnerabilities in device-implemented RPC (remote procedure call) interface can lead to complete device compromise. By the latest data from ThroughTek, its Kalay platform has more than 83 million active devices and manages over 1 billion connections every month. The best way to protect yourself from this vulnerability is to keep your device software and applications updated to the latest version, as well as create complex, unique login passwords. The report also recommends you avoid connecting to IoT devices from an untrusted network.
Tracked as CVE-2021-28372, the issue is a device impersonation vulnerability that received a severity score of 9.6 out of 10. It affects the Kalay protocol that is implemented as a software development kit (SDK) that is built into mobile and desktop applications. Mandiant's Jake Valletta, Erik Barzdukas, and Dillon Franke looked at ThroughTek's Kalay protocol and found that registering a device on the Kalay network required only the device's unique identifier (UID). Following this lead, the researchers discovered that a Kalay client, such as a mobile app, usually receives the UID from a web API hosted by the vendor of the IoT device. An attacker with the UID of a target system could register on the Kalay network a device they control and receive all client connection attempts. This would allow them to obtain the login credentials that provide remote access to the victim device audio-video data. The researchers say that this type of access combined with vulnerabilities in device-implemented RPC (remote procedure call) interface can lead to complete device compromise. By the latest data from ThroughTek, its Kalay platform has more than 83 million active devices and manages over 1 billion connections every month. The best way to protect yourself from this vulnerability is to keep your device software and applications updated to the latest version, as well as create complex, unique login passwords. The report also recommends you avoid connecting to IoT devices from an untrusted network.
No surprise (Score:4, Informative)
The lack of consideration for security in IoT devices is well known. It's one of the reasons I don't own a single IoT item.
Re: (Score:1)
Re: (Score:1)
Re: (Score:2)
Re:No surprise (Score:5, Funny)
The S in "IoT" stands for security, P for privacy.
Re: (Score:2)
The S in "IoT" stands for security, P for privacy.
=)))
abbrevs (Score:2)
Re: (Score:3)
There are ways around it in some cases. I kind of don't care if they get into my $7 chinese dimmer lightbulbs. Whatever, I'll just replace them if they do something stupid, they are set to automatically turn on and off, so a hacker wont work out my schedule from them. The cameras, I specifically blocked them from talking to the net and after a bit of nmapping worked out the RTP ports and hooked them to an internal synology box (wth security camera data archived off site via a non IOT cloud provider).
But for
Re: (Score:2)
A lot of these cloud based iot devices are caused by prevalence of NAT..
Users want to reach their devices from outside, due to NAT they can't, instructions to forward a port would vary depending on the type of equipment in use and might not be possible at all (eg CGNAT setup), all of which would be beyond the capabilities of most users. So instead, they make it talk to a cloud server and insert themselves as a middleman.
From the perspective of the company providing the device its a win win:
Easier for the us
Re: (Score:3)
If a user can't configure their NAT router to allow an iOT device through, what makes you think they can configure their firewall to allow access to an IPv6 device?
Or are you going to assume all IPv6 devices will be accessible over the internet? Because while IPv6 address space precludes scanning efficiently (that we know of), there's no reason why this might remain the case forever.
Relying on the vastness of IPv6 is just a form of security through obscurity. It only takes one vulnerability one can exploit
Re: (Score:2)
If a user can't configure their NAT router to allow an iOT device through, what makes you think they can configure their firewall to allow access to an IPv6 device?
They can't, although it avoids the CGNAT case where the user isn't in control of it no matter what changes they make to their own user.
It's also less confusing, device has address X - allow access to address X, connect to address X. Rather than device has internal address X while router has external address Y, having to forward ports from Y to X and where the device itself doesn't know what the external address is either and you have to use a different address to connect wether your inside or outside, eugh.
Re: No surprise (Score:4, Informative)
Re: (Score:2)
Rather than getting IoT lightbulbs it's better to get an IoT lightswitch. Find one that works with Tasmota open source firmware. Then you have full control of the device, it doesn't need off-site servers to work. If any security issues are discovered with Tasmota you can be sure that there will be a firmware update available very quickly.
Then isolate it all on a dedicated WiFi network with no internet access.
No Internet of Toys, no problem (Score:2)
I'll give it another ten years for better options to offer themselves or me to care enough to roll my own.
Re: (Score:3)
Call me a luddite, but what even is the point of IoT devices? Most appliances now come with a timer or at least a built-in scheduler. Do people really value the ability to switch on the porch light from their phone that much?
The only valid case I can think of is a security camera that you can check on with your phone while you're out. But my home is equipped with good old Iron Bars On Window And Door technology and this has stood the test of time and guaranteed me a robbery rate of 0.
Re: (Score:2)
It gets interesting when you integrate with Home Assistant. Then you can program the system, so for example you could use occupancy sensors to control the lights or enforce turning the AC off when nobody has been in the room for 30 minutes.
It's also quite handy for monitoring. Say you have a garage door opening, you can see it's status at a glance. You can also program things like automatic close if nobody is in the garage, or a bedtime routine that checks for things like open doors and windows or lights yo
Re: (Score:3)
Correcting the final para (Score:3)
"The best way to protect yourself from this vulnerability is not to own any IoT devices."
Re: (Score:2)
You don't have to be a luddite to be secure. Buy IoT devices that you can run open source firmware on, Tasmota being the most popular one. A lot of cheap devices can run it. Use Home Assistant as the controller using your own hardware (Raspberry Pi is ideal).
Then isolate the whole thing on a dedicated network with no internet access. If you do need outside access then setting up a VPN is the best option.
Re: (Score:2)
great advice except for that ~90% of the people out there barely know how to change the batteries on their TV remote and/or don't give a fuck about it.
"Oh they wouldn't care about me, I'm not anyone important."
or
"We're too small of a business for anyone to want to hack us." (I've had several employers who said exactly this)
or
"Meh, it's too much trouble to worry about it and they will get my info anyway so why bother"
etc.
Sound familiar?
side note. thanks for the pointer to Tasmota, I'd never heard of
Re: (Score:2)
I get your point, and maybe that would be secure. But "luddite"? Why? I have yet to see a single IoT device that would do anything useful for me. I looked just now at the IBM IoT blog page, and the ideas--except for self-driving cars, which are still in the future, are either ludicrous (your alarm clock finds out your train will be late, so you have to drive, so it wakes you up early for your commute) or scary (a part in your car is wearing out, so it makes an appointment for you at the dealer).
So unles
What devices? (Score:5, Insightful)
Sure would be nice to know what devices or what manufacturers.
Just went through the links in this article and others, and haven't found a one yet that lists any specific devices or manufacturers.
Re: (Score:2)
They seem to consider the list of companies using their technology to be some kind of trade secret. Seems like a new law is needed to require disclosing of all vulnerable devices.
I wonder about IPv6 vs 4 (Score:2)
Re: (Score:2)
Many ISPs already have IPv6, only very lousy ones haven't bothered rolling it out.
Re: (Score:2)
This is not a bug (Score:3, Insightful)
Got lucky (Score:2)
I was already sitting down when I read this.
No need for fines (Score:2)
Re: (Score:1)
IoT (Score:2)
How many devices are not upgradable? (Score:1)
>The best way to protect yourself from this vulnerability is to keep your device software and applications updated to the latest version
And I wonder how many such IoT devices are simply not upgradable and/or have already been abandoned by their manufacturer.
And on that note from an article: https://www.fireeye.com/blog/t... [fireeye.com]: "Mandiant is unable to determine a complete list of products and companies affected by the discovered vulnerability".
How convenient for them and their customers. How inconvenient
R stands for Return it and get a full refund (Score:2)
Goddamnit (Score:2)
An attacker with the UID of a target system (Score:1)
Where does the attacker get the UID from? Guessing a 128 bit random number?
Many of you are addicts. (Score:1)