Multiple Vulnerabilities in Belkin WeMo Insight Switch
Internet of Things devices have become commonplace in modern homes. Relatively inexpensive and easy to control remotely, they promise a world at your fingertips. Security vulnerabilities in connected devices can not only affect the user experience but can also give cyber-criminals an open door to your local network. This is also the case with the Belkin WeMo Insight Switch, a smart power plug that lets you turn any conventional device into a smart one.
This article – part of a series developed in partnership with PCMag – aims to shed light on the security of the world’s best-sellers in the IoT space. PCMag contacted the research team at Bitdefender and asked us to look at several popular devices, including the Belkin WeMo Switch. More information is available in this article published on PCMag.
In the spirit of responsible disclosure, this whitepaper has been published after the release and adoption of a patch to mitigate the described issues. A new firmware version has been made available for affected customers. More information on how to update is available in this support article on the Belkin website.
This attack is local – in order to exploit the vulnerabilities, an attacker would already need presence inside the device’s network. While this limits exploitation, there are several circumstances where a threat actor would legitimately be able to join the local network (coffee shops, hotels, co-working spaces).”
Vulnerabilities at a glance
While investigating the Belkin WeMo Insight Switch, Bitdefender researchers have identified two vulnerabilities that can allow an attacker on the local network to obtain code execution on the device, as well as to gain root access to the filesystem, provided that they have physical access to the unit. These vulnerabilities are summarized in CVE-2019-17094.
The new Belkin WeMo vulnerability can allow an attacker on the local network to obtain remote code execution on the device. This could potentially have a significant impact on the users’ devices connected to the local network.
A determined attacker could use the remote code execution vulnerability to plant a backdoor and remotely sniff the connection, map the consumer behavior or see when people are at home or not. Given the fact that IoT devices are not checked by conventional anti-malware solution, an affected owner would be unable to notice that the device had been compromised.
More information is available in the technical whitepaper below:
LuminousMoth – PlugX, File Exfiltration and Persistence Revisited
July 21, 2021
How We Tracked a Threat Group Running an Active Cryptojacking Campaign
July 14, 2021
A Note from the Bitdefender Labs Team on Ransomware and Decryptors
May 26, 2021
New Nebulae Backdoor Linked with the NAIKON Group
April 28, 2021
Good riddance, GandCrab! We’re still fixing the mess you left behind.
June 17, 2019
FOLLOW US ON
You might also like
July 14, 2021