Multiple Vulnerabilities in Belkin WeMo Insight Switch
Internet of Things devices have become commonplace in modern homes. Relatively inexpensive and easy to control remotely, they promise a world at your fingertips. Security vulnerabilities in connected devices can not only affect the user experience but can also give cyber-criminals an open door to your local network. This is also the case with the Belkin WeMo Insight Switch, a smart power plug that lets you turn any conventional device into a smart one.
This article – part of a series developed in partnership with PCMag – aims to shed light on the security of the world’s best-sellers in the IoT space. PCMag contacted the research team at Bitdefender and asked us to look at several popular devices, including the Belkin WeMo Switch. More information is available in this article published on PCMag.
In the spirit of responsible disclosure, this whitepaper has been published after the release and adoption of a patch to mitigate the described issues. A new firmware version has been made available for affected customers. More information on how to update is available in this support article on the Belkin website.
This attack is local – in order to exploit the vulnerabilities, an attacker would already need presence inside the device’s network. While this limits exploitation, there are several circumstances where a threat actor would legitimately be able to join the local network (coffee shops, hotels, co-working spaces).”
Vulnerabilities at a glance
While investigating the Belkin WeMo Insight Switch, Bitdefender researchers have identified two vulnerabilities that can allow an attacker on the local network to obtain code execution on the device, as well as to gain root access to the filesystem, provided that they have physical access to the unit. These vulnerabilities are summarized in CVE-2019-17094.
The new Belkin WeMo vulnerability can allow an attacker on the local network to obtain remote code execution on the device. This could potentially have a significant impact on the users’ devices connected to the local network.
A determined attacker could use the remote code execution vulnerability to plant a backdoor and remotely sniff the connection, map the consumer behavior or see when people are at home or not. Given the fact that IoT devices are not checked by conventional anti-malware solution, an affected owner would be unable to notice that the device had been compromised.
More information is available in the technical whitepaper below:
BackdoorDiplomacy Wields New Tools in Fresh Middle East Campaign
December 06, 2022
Side-Loading OneDrive for profit – Cryptojacking campaign detected in the wild
October 05, 2022
A Red Team Perspective on the Device42 Asset Management Appliance
August 10, 2022
Vulnerabilities Identified in Wyze Cam IoT Device
March 29, 2022
New FluBot and TeaBot Global Malware Campaigns Discovered
January 26, 2022
Bitdefender Honeypots Signal Active Log4Shell 0-Day Attacks Underway; Patch Immediately
December 10, 2021