Advert.

Do NOT tell your scammer he is posted here, or report their accounts as it puts others at risk!

Millions of consumer smart devices exposed by flaw

Did you read about scams in the papers, or see it on TV? Let us know.

Millions of consumer smart devices exposed by flaw

Unread postby SlapHappy » Wed May 01, 2019 2:34 pm

https://nakedsecurity.sophos.com/2019/0 ... rity-flaw/

Millions of consumer smart devices exposed by serious security flaw
01 MAY 2019
0
IoT, Security threats, Vulnerability
Get the latest security news in your inbox.
you@example.com
Don't show me this again

Previous: Diabetics are hunting down obsolete insulin pumps with a security flaw
Next: Keeping your data safe when traveling
by John E Dunn
A security researcher has discovered severe flaws in an Internet of Things (IoT) software feature called iLnkP2P, which renders the millions of consumer devices using it vulnerable to remote discovery and hijack.

Publicised by Paul Marrapese, neither iLnkP2P nor the Chinese company that developed it, Shenzhen Yunni Technology, will be familiar names to the people buying the products containing it.

Despite this, iLnkP2P was identified in at least two million devices made by companies including HiChip, TENVIS, SV3C, VStarcam, Wanscam, NEO Coolcam, Sricam, Eye Sight, and HVCAM.

The software’s purpose is to allow IoT devices such as security webcams, baby monitors, and smart doorbells to be configured quickly without having to know how to open ports in a broadband router’s firewall.

Instead, consumers can power on their new device and instantly connect to it in peer-to-peer (P2P) fashion using an app on their computer by entering a Unique Identifier (UID). Nice and easy to use but not, it turns out, a good architecture from a security point of view.

The flaws
The main iLnkP2P flaw is CVE-2019-11220, which for understandable reasons Marrapese doesn’t dwell on but he says allows attackers to carry out man-in-the-middle attacks and steal device passwords on the way to a device takeover.

However, it’s the second flaw, CVE-2019-11220, that allows attackers to discover which devices are vulnerable to the above weakness and reach out to them even when they’re on the other side of an apparently secure firewall using Network Address Translation (NAT).

Most of the devices don’t appear to use encryption. Marrapese even accuses one vendor of lying about the state of the encryption they use.

Any device using iLnkP2P is at risk. The easiest way to determine whether a device is using this is to look for the UID printed on a sticker on the side of the device (which corresponds to the first three of the four letters). This can then be checked against the list of 91 known UIDs published by Marrapese.

However, this list isn’t exhaustive – there could be further devices not listed that are using iLnkP2P and have different UIDs.

DEEP LEARNING FOR DEEPER CYBERSECURITY
Watch Video
Fixing the hole
For owners of these devices, there don’t appear to be many mitigations beyond manually blocking the software’s UDP port, 32100. This will allow local access while blocking remote traffic. Alternatively, writes Marrapese:

Buy a new device from a reputable vendor. Research suggests that a fix from vendors is unlikely, and these devices are often riddled with other security problems that put their owners at risk.

Sure enough, when Marrapese contacted the affected makers several times between January and February, he heard nothing back.

And that’s the thing about so many IoT devices, especially ones made cheaply and quickly by manufacturers who seem more concerned with shifting units than worrying about aftersales. The fact that a flaw exists – and a big flaw at that – has no bearing on whether it will ever be patched.

Pessimistic perhaps but it’s a fundamental issue. Anyone buying a product that can’t or won’t be updated is buying something with a very short life expectancy.

It’s sometimes said that users don’t care enough about security to take action in their own interests but it’s hard to believe that anyone buying a webcam trained on the inside of their house would be happy at the thought of cybercriminals taking control of it.

This follows a wearying series of IoT security scares, including that many of the apps used to control these devices have security weaknesses of their own.
If anyone asks you for money on the Internet they are always a scammer, 100% of the time.
Blackmail Scammed? Go here: https://www.scamsurvivors.com/blackmail/#/
FAQ viewtopic.php?f=3&t=19
Victim of a scam? Go here: https://scamsurvivors.com/forum/viewtop ... =3&t=26504
User avatar
SlapHappy
Retired admin/co creator
 
Posts: 44968
Joined: Tue Apr 17, 2012 5:18 am
Location: Just a face in a magazine, watching you post your scammer's details.

Return to Media reports.

Who is online

Users browsing this forum: No registered users and 20 guests