• About
  • Advertise
  • Contact
Wednesday, April 15, 2026
No Result
View All Result
NEWSLETTER
iotindiana
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
  • Home
  • Internet of Things
  • Security
  • WAN
  • Cloud Computing
  • Mobile
  • Networking
  • Software
No Result
View All Result
iotindiana
No Result
View All Result
Home Security

Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON

in Security
0
SHARES
6
VIEWS
Share on FacebookShare on Twitter

Smart door locks, padlocks, thermostats, refrigerators, wheelchairs and even solar panel arrays were among the internet-of-things devices that fell to hackers during the IoT Village held at the DEF CON security conference in August.

A month after the conference ended, the results are in: 47 new vulnerabilities affecting 23 devices from 21 manufacturers were disclosed during the IoT security talks, workshops and onsite hacking contests.

The types of vulnerabilities found ranged from poor design decisions like the use of plaintext and hard-coded passwords to coding flaws like buffer overflows and command injection.

Door locks and padlocks from vendors like Quicklock, iBlulock, Plantraco, Ceomate, Elecycle, Vians, Lagute, Okidokeys, Danalock were found to be vulnerable to password sniffing and replay attacks, where a captured command can be replayed later to open the locks.

A wheelchair from an unknown vendor had a vulnerability that could be exploited to disable a safety feature and take control of the device. A thermostat from Trane used a weak plain text protocol potentially allowing attackers to cause excessive heating, furnace failures or frozen water pipes by manipulating thermostat functionality.

Several security issues, including a hard-coded password, a command injection flaw, an open access point connection and a lack of network segmentation were found in a solar array management device from Tigro Energy.

By exploiting these flaws “I can shut down the equivalent of a small to mid-sized power generation facility or I can use that device as a trojan within a target’s network to spy on them,” Fred Bret-Mounet, the researcher who found the issues, wrote in their description. “It looks very likely that I can remotely physically damage a solar array using this device.”

Another researcher found that he could convert guest access to a smart lock from a vendor called August into irrevocable admin access. Gaining short-term access to the lock owner’s phone could also be turned into long-term admin access.

“If you bought a used ASL-01 lock, any previous owner or guest of a previous owner could gain access to your home,” the researcher said. “If you bought a used lock on eBay said previous owner knows where you live.”

Home networking devices were not left out. A buffer overflow and a cross-site request forgery flaw was found in the Belkin F9K1122 wireless range extender and a buffer overflow was found in the ZyXel NBG6716 wireless router. The flaws could be exploited to take control of local networks.

This is the second year that the IoT Village was held at DEF CON and the event has so far led to the discovery of 113 critical vulnerabilities across consumer and business IoT products. Its success shows that many device manufacturers in this tech segment continue to ignore security best practices.

Even though there have been some efforts to draft security guides and standards for IoT vendors, the rush to bring new “smart” devices to market will unfortunately mean that many of them will have critical flaws.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.
Download WordPress Themes Free
Free Download WordPress Themes
Download Premium WordPress Themes Free
Premium WordPress Themes Download
free download udemy course
download xiomi firmware
Free Download WordPress Themes
udemy paid course free download
Tags: Hackers found 47 new vulnerabilities in 23 IoT devices at DEF CON
Next Post

Cambium Networks helps provide the network for the IoT

Recommended

VPNs explained

Airbnb to reveal 124 New York hosts to attorney general

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Careers
  • Cloud Computing
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Data Center
  • Data Centers
  • Databases
  • Development
  • Enterprise
  • Hardware
  • Healthcare
  • IIoT
  • Infrastructure
  • Internet of Things
  • IoT
  • IT Leadership
  • Manufacturing
  • Mobile
  • Networking
  • Oil & Gas
  • Open Source
  • Security
  • Smart Cities
  • Smart Homes
  • Software
  • Software Development
  • Standards
  • Technology Industry
  • Uncategorized
  • Unified Communications
  • Virtualization
  • WAN
  • Wearables

About Us

Advance IOT information site of Indiana USA

© 2024 iotindiana.com.

No Result
View All Result
  • Home
  • Internet of Things
  • Security
  • WAN
  • IoT
  • Cloud Computing
  • Data Centers
  • Mobile
  • Networking
  • Software

© 2024 iotindiana.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In