• About
  • Advertise
  • Contact
Saturday, April 18, 2026
No Result
View All Result
NEWSLETTER
iottennessee
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
No Result
View All Result
iottennessee
No Result
View All Result
Home Security

Flaws in Trane thermostats underscore IoT security risks, Cisco says

in Security
0
0
SHARES
4
VIEWS
Share on FacebookShare on Twitter

Cisco warned on Monday of serious flaws it found in an Internet-connected thermostat control, which it said are typical among products of vendors who aren’t well-versed in network security.

The flaws were found in the ComfortLink II thermostats made by Trane. The thermostats allow users to control room temperature from a mobile device, display the weather and even act as a digital photo frame.

Cisco’s Talos unit said the issues have now finally been patched since notifying Trane nearly two years ago, which is why it went public.

“The unfortunate truth is that securing internet-enabled devices is not always a high priority among vendors and manufacturers,” wrote Alex Chiu, a Cisco threat researcher, in a blog post Monday.

“While IoT devices such as smart thermostats, home lighting, and security systems bring an added level of convenience into our lives, these vulnerabilities highlight the dangers of insecure development practices,” he wrote.

Cisco found three vulnerabilities which could be used to gain remote control of the thermostat, run rogue code and gain access to the local network.

Trane was notified in April 2014. It patched two of the vulnerabilities in April 2015 and the final one on Jan. 27, Chiu said.

“We are unable to determine if Trane has associated these vulnerabilities with security advisories or if they have effectively communicated the necessity of installing these updates to their customers,” he wrote. “As a result, Talos recommends that users who own these thermostats to update immediately.”

The updated version of the ComfortLink II firmware is 4.0.3, which is available on Trane’s website.

The problems Cisco found violate some of the most basic security tenets. The ComfortLink II’s firmware contained two sets of user credentials with hardcoded passwords. An attacker could log into the device over SSH and then would have access to a fully functioning BusyBox environment, which is a toolkit for embedded Linux OSes.

The other two vulnerabilities related to a buffer overflow, which could be exploited.

Trane officials couldn’t immediately be reached for comment.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2016 IDG Communications, Inc.

Next Post

Microsoft launches IoT Hub to ingest data from the physical world

Recommended

Black Hat: 9 free security tools for defense & attacking

A $250 million reason to prototype your IoT idea

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Hardware
  • Infrastructure
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • Open Source
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2019-20 iottennessee.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware

© 2019-20 iottennessee.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In