web analytics

Vulnerabilities in TP-Link IoT Devices Can Get You Hacked – Source: heimdalsecurity.com

Rate this post

Source: heimdalsecurity.com – Author: Andreea Chebac

Four new vulnerabilities have been discovered in the TP-Link Tapo L530E smart bulb and TP-Link’s Tapo app. Researchers from Universita di Catania and the University of London say that hackers could exploit these flaws to steal WiFi passwords.

TP-Link Tapo L530E smart bulb is a top seller, including through Amazon and TP-link Tapo smart device management app has over 10 million installations on Google Play.

Their popularity is what made researchers from Italy and the UK analyze them. The paper containing this information focuses on highlighting security dangers in the numerous consumer IoT devices.

Among the identified risks there are hazardous data transmission and inadequate authentication procedures.

TP-Link acknowledged the findings and expressed the intention of fixing the bugs. However, it is unclear from the paper if the patches have already been released or not.

Details about the Vulnerabilities

The first of the vulnerabilities (CVSS v3.1 score: 8.8) allows the threat actor to pretend to be the Tapo L503E device during the session key exchange phase on. A hacker could use this improper authentication high-severity flaw to steal passwords and manipulate the device.

The second flaw is also a high-severity issue (CVSS v3.1 score: 7.6) arising from a hard-coded short checksum shared secret, which attackers can obtain through brute-forcing or by decompiling the Tapo app.

BleepingComputer (Source)

The third bug is of medium severity and refers to the cryptographic scheme’s predictability due to the lack of randomness during symmetric encryption.

The absence of tests for the recentness of received messages causes a fourth issue. This allows attackers to replay communications for 24 hours while maintaining the session keys’ validity.

Possible Attacks

Using these TP-Link Tapo vulnerabilities, cybercriminals can attack users in several manners.

Threat actors can use vulnerabilities 1 and 2 to perform bulb impersonation and steal the user’s account details. Using the stolen data, the attacker can access the WiFi SSID and password, opening a path to all the devices connected to the network.

Vulnerabilities in TP-Link IoT Devices Can Get You Hacked

BleepingComputer (Source)

For this attack to work, devices must be in setup mode. But the attacker can reset the smart bulb’s authentication, causing the user to re-configure it in ordtot working again.

Another attack type explored by the researchers is MITM (Man-In-The-Middle) attack with a configured Tapo L530E device, exploiting vulnerability 1 to intercept and manipulate the communication between the app and the bulb and capturing the RSA encryption keys used for subsequent data exchange.

MITM attacks are also possible with unconfigured Tapo devices by leveraging vulnerability one again by connecting to the WiFi during setup, bridging two networks, and routing discovery messages, eventually retrieving Tapo passwords, SSIDs, and WiFi passwords in easily decipherable base64 encoded form.

BleepingComputer (Source)

Lastly, vulnerability 4 enables attackers to execute replay attacks, copying already intercepted communications to make changes to the device’s functionality.

How to Stay Safe

IoT devices are more and more common, which is why IoT security becomes a crucial subject for cybersecurity.

Tips to stay safe:

  • separate IoT devices from crucial networks
  • use the most recent firmware updates and companion app versions that are available
  • use strong passwords and multi-factor authentication to secure accounts
  • narrow down internal and external port communication on your firewalls
  • invest in network security solutions that can protect a network if a device gets breached.

If you liked this article, follow us on LinkedInTwitterFacebook, and YouTube, for more cybersecurity news and topics.

If you liked this post, you will enjoy our newsletter.

Get cybersecurity updates you’ll actually want to read directly in your inbox.

Original Post URL: https://heimdalsecurity.com/blog/vulnerabilities-in-tp-link-iot-devices-can-get-you-hacked/

Category & Tags: Cybersecurity News – Cybersecurity News

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post

More Latest Published Posts