Stories
Slash Boxes
Comments

SoylentNews is people

Submission Preview

Link to Story

A universal password. Unencrypted user data and commands. What could go wrong?

Accepted submission by Ometecuhtli mailto:fersosam@gmail.com at 2023-04-05 06:50:02 from the Could you be any more dense? dept.
News

https://arstechnica.com/information-technology/2023/04/open-garage-doors-anywhere-in-the-world-by-exploiting-this-smart-device/ [arstechnica.com]

Open garage doors anywhere in the world by exploiting this “smart” device

A universal password. Unencrypted user data and commands. What could go wrong?

A market-leading garage door controller is so riddled with severe security and privacy vulnerabilities that the researcher who discovered them is advising anyone using one to immediately disconnect it until they are fixed.

Each $80 device used to open and close garage doors and control home security alarms and smart power plugs employs the same easy-to-find universal password to communicate with Nexx servers. The controllers also broadcast the unencrypted email address, device ID, first name, and last initial corresponding to each one, along with the message required to open or shut a door or turn on or off a smart plug or schedule such a command for a later time.

The result: Anyone with a moderate technical background can search Nexx servers for a given email address, device ID, or name and then issue commands to the associated controller. (Nexx controllers for home security alarms are susceptible to a similar class of vulnerabilities.) Commands allow the opening of a door, turning off a device connected to a smart plug, or disarming an alarm. Worse still, over the past three months, personnel for Texas-based Nexx haven’t responded to multiple private messages warning of the vulnerabilities.

“Nexx has consistently ignored communication attempts from myself, the Department of Homeland Security, and the media,” the researcher who discovered the vulnerabilities wrote in a post published on Tuesday. “Device owners should immediately unplug all Nexx devices and create support tickets with the company requesting them to remediate the issue.”

The researcher estimates that more than 40,000 devices, located in residential and commercial properties, are impacted and more than 20,000 individuals have active Nexx accounts [...]

[...] Researcher Sam Sabetan found that devices use the same password to communicate with the Nexx cloud. What’s more, this password is easily attainable simply by analyzing the firmware shipped with the device or the back-and-forth communication between a device and the Nexx cloud.

“Using a universal password for all devices presents a significant vulnerability, as unauthorized users can access the entire ecosystem by obtaining the shared password,” the researcher wrote. “In doing so, they could compromise not only the privacy but also the safety of Nexx’s customers by controlling their garage doors without their consent.”

When Sabetan used this password to access the server, he quickly found not only communications between his device and the cloud but communications for other Nexx devices and the cloud. That meant he could sift through the email addresses, last names, first initials, and device IDs of other users to identify customers based on unique information shared in these messages.

But it gets worse still. Sabetan could copy messages other users issued to open their doors and replay them at will—from anywhere in the world. That meant a simple cut-and-paste operation was enough to control any Nexx device no matter where he or it was located.

A proof-of-concept video demonstrating the hack follows:

https://www.youtube.com/watch?v=kD1cBfv9To8&embeds_euri=https%3A%2F%2Farstechnica.com%2F&feature=emb_imp_woyt [youtube.com]


Original Submission