• About
  • Advertise
  • Contact
Wednesday, April 15, 2026
No Result
View All Result
NEWSLETTER
iottennessee
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware
No Result
View All Result
iottennessee
No Result
View All Result
Home Security

Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON

in Security
0
0
SHARES
12
VIEWS
Share on FacebookShare on Twitter

Smart door locks, padlocks, thermostats, refrigerators, wheelchairs and even solar panel arrays were among the internet-of-things devices that fell to hackers during the IoT Village held at the DEF CON security conference in August.

A month after the conference ended, the results are in: 47 new vulnerabilities affecting 23 devices from 21 manufacturers were disclosed during the IoT security talks, workshops and onsite hacking contests.

The types of vulnerabilities found ranged from poor design decisions like the use of plaintext and hard-coded passwords to coding flaws like buffer overflows and command injection.

Door locks and padlocks from vendors like Quicklock, iBlulock, Plantraco, Ceomate, Elecycle, Vians, Lagute, Okidokeys, Danalock were found to be vulnerable to password sniffing and replay attacks, where a captured command can be replayed later to open the locks.

A wheelchair from an unknown vendor had a vulnerability that could be exploited to disable a safety feature and take control of the device. A thermostat from Trane used a weak plain text protocol potentially allowing attackers to cause excessive heating, furnace failures or frozen water pipes by manipulating thermostat functionality.

Several security issues, including a hard-coded password, a command injection flaw, an open access point connection and a lack of network segmentation were found in a solar array management device from Tigro Energy.

By exploiting these flaws “I can shut down the equivalent of a small to mid-sized power generation facility or I can use that device as a trojan within a target’s network to spy on them,” Fred Bret-Mounet, the researcher who found the issues, wrote in their description. “It looks very likely that I can remotely physically damage a solar array using this device.”

Another researcher found that he could convert guest access to a smart lock from a vendor called August into irrevocable admin access. Gaining short-term access to the lock owner’s phone could also be turned into long-term admin access.

“If you bought a used ASL-01 lock, any previous owner or guest of a previous owner could gain access to your home,” the researcher said. “If you bought a used lock on eBay said previous owner knows where you live.”

Home networking devices were not left out. A buffer overflow and a cross-site request forgery flaw was found in the Belkin F9K1122 wireless range extender and a buffer overflow was found in the ZyXel NBG6716 wireless router. The flaws could be exploited to take control of local networks.

This is the second year that the IoT Village was held at DEF CON and the event has so far led to the discovery of 113 critical vulnerabilities across consumer and business IoT products. Its success shows that many device manufacturers in this tech segment continue to ignore security best practices.

Even though there have been some efforts to draft security guides and standards for IoT vendors, the rush to bring new “smart” devices to market will unfortunately mean that many of them will have critical flaws.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes Free
Download Best WordPress Themes Free Download
Download Best WordPress Themes Free Download
Download Best WordPress Themes Free Download
udemy free download
download lenevo firmware
Download Best WordPress Themes Free Download
udemy paid course free download
Next Post

Cambium Networks helps provide the network for the IoT

Recommended

Singapore’s ‘city brain’ project is groundbreaking — but what about privacy?

Is this the year IoT standards will finally make sense?

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • Careers
  • Cloud Computing
  • Data Center
  • Data Centers
  • Databases
  • Hardware
  • Infrastructure
  • Internet of Things
  • IT Leadership
  • Mobile
  • Networking
  • Open Source
  • Security
  • Software
  • Software Development
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN

About Us

Get updated with latest IOT related news and information with us.

© 2019-20 iottennessee.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • Uncategorized
  • Mobile
  • Networking
  • WAN
  • Cloud Computing
  • Data Centers
  • Technology Industry
  • Hardware

© 2019-20 iottennessee.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In