Common Security Flaws in IoT Products

They’re on the rage right now, smart devices that we typically refer to as the internet of things. Everything and anything can now be a smart device including, appliances, homes, medical devices, manufacturing, and even fish tanks. They provide convenience in our lives but now come at a security price. Each and every device in your home is a security vulnerability. It is reasonable to assume that each device was developed to protect your data, however this is not the case. Often these smart devices which become part of the internet of things (IoT) are developed with the minimum necessary to function, with security a mere afterthought.

Common Security Flaws in IoT Products

IoT Products and Lack of Security

Businesses often would like to be the first to market with an invention, so there is a surge of interest when a sleek product is presented to investors. The business model with IoT products often revolve around continued streams of income after a product has been sold to the customer. This often looks like a subscription for data, parts or accessories. Businesses and investors are excited by these products and neither one considers the security of their customers or the general public when pushing these products on to the market. The burden for security in IoT products is on manufacturers, network carriers, and enterprise clients. With three actors involved, streamlined security can be harder to implement than you think.

READ ALSO: Top 8 Security Design Principles for IoT Product Developers in the Private Sector

Common Security Flaws in IoT Products

For the last two years the IoT Village has been held at DEF CON where the event invites hackers to break into IoT business and consumer products. The first year revealed 113 critical vulnerabilities that were accessed with relative ease. The second year an additional 47 vulnerabilities were identified. It can be expected that this year little to no progress has been made on security in IoT. Often hackers use IoT products to gain access to the networks the products live in.

Poor Design Decisions

Some of the vulnerabilities identified could be categorized as simply really terrible design decisions. These included the use of hard-coded passwords. Hard-coded passcodes present an issue because the source code often ships with the product. Any hacker would know how to disassemble the firmware in order to access the passwords. These are often in a product for a streamlined development process but are left in the product during final production. This happens across many devices and in some cases could give complete control to a remote hacker to the whole network.

Coding Flaws

Among IoT products hackers continue to find coding that allows for command injections. In these cases content is dynamically generated on an interface. Skilled hackers can intercept these command injections and have an IoT device execute malicious code. Code injection allows for one of the widest ranges of attacks on a network.

Default Passwords

Often IoT manufacturers ship products with a default password for users to initially access the products software capabilities and connect it to the network. This sounds fine on the surface but after the initial setup, no one really ever changes that password. Malware that use botnets to take control of devices often take advantage of this human error to control any smart devices on a network. Manufacturers do not attempt to make it mandatory to change the password before use.

Grim Outlook

So far security is still not a priority for IoT manufacturers at any point along the product development process. Some of this can be attributed to lack of knowledge, but much of it is pressure to get to market. It is of concern that at the DEF CON event the number of vulnerabilities increased without any improvement. There has been attempts by governments to develop IoT cyber security regulation. However cyber security experts have claimed that the approach is not good enough. Given the lack of speed at which the industry is moving in regards to security, it seems regulation is the only thing that will move it forward.

The IoT industry is very young and is vulnerable in a hostile cyber world. There needs to be a coordinated effort between manufacturers, network carriers, and enterprise clients. This article had an emphasis on manufacturers and their need to practice security by design. Do you think that the IoT industry will make any progress on cyber security by the end of next year?

Joshua Morales

Joshua Morales

Joshua Morales is a San Juan based writer who enjoys producing cyber-security insights for business leaders around the globe. He can also be found writing about sustainability, capital markets, and open-source software.Joshua can be contacted at [email protected]

You may also like...

1 Response

  1. The industry and consumers should for sure advocate for the government regulations in this area. Also, I think that out of these three flaws Default Passwords menace could be in some way remediated by automation. We have built a system (https://www.xtontech.com) that would scan the network for default passwords in IoT devices and then it could reset these passwords to the ones that are randomly generated. After that the system would store these passwords in the secure vault to use when needed.

Leave a Reply

Your email address will not be published. Required fields are marked *