Especialistas em segurança descobriram uma grande fraqueza em protocolos de M2M que permite que hackers para ultrapassar os dispositivos da Internet das coisas. Os especialistas afirmam que este pode resultar na sabotagem de instalações de produção e consequências graves para os proprietários de casa inteligente.
M2М Protocols Abuse Leads to Serious Iot Security Risks
A team of security experts reported that a yet another IoT (Internet das Coisas) security risk has been identified, this time it comes from the M2M (machine-to-machine) protocols that these devices utilize. Two of them have been identified to be very problematic for IoT devices — the Message Queuing Telemetry Transport (MQTT) and Constrained Application Protocol (CoAP). They allow communication between the interconnected IoT devices.
According to the released report abuse of these protocols can lead to devastating consequences both for these IoT devices and other hosts located on the local network. It appears tat the Transporte de telemetria de enfileiramento de mensagens (MQTT) protocolo. One of the problems is when the broker does not follow the standard message transport rules. In the situation where client responds in the correct way it will be disconnected when they have received invalid content. As a consequence the target devices will be kept constantly resetting the connection in a loop. This message verification bug has been reported to the MQTT Technical Committee who have clarified a potential security issue in the latest standard.
The second issue is related to URI-style topic validation which may cause regular expression denial-of-service attacks. What’s more dangerous is the fact that this can potentially impact any software installed on the devices. When implemented these cases lead to specific vulnerabilities:
- MQTT Payload Remaining Length (CVE-2018-17614) — This allows attackers to execute arbitrary code due to a missing check on a certain field.
- MQTT Unicode Handling in Topic Strings (CVE-2017-7653) — This is a popular vulnerability which as patched upstream. However many devices are still unpatched and thus vulnerable.
- MQTT URI-Style Topic Validation (CVE-2018-11615) — This is a regular expression denial-of-service technique allowing IoT devices to be taken down.
The other vulnerable protocol that has been analyzed by the research team is called Constrained Application Protocol (CoAP). The study finds that it is susceptible to IP spoofing which allows for numerous attack scenarios to be executed.
Iot Security In Danger: The effects of the M2M Protocols Abuse
When it comes to the practical aspects of the M2M protocols vulnerabilities the possibilities for abuse are many. Information harvesting is particularly effective as the hackers can simply eavesdrop on the traffic. The demonstrations reveal a partial list of affected sectors: large consumer electronic and mobile device manufacturers, fashion industry, marine, ISPs, logistics services, display manufacturers, automotive parts manufacturers, medical equipment devices, construction and production facilities and etc.
As a result of this sensitive content can be hijacked — emails, Mensagens privadas, notificações, cartas, contratos e etc.. What’s more dangerous is that due to the fact that overall IoT security is concerned the criminals can also harvest network configuration settings. Following the release of the document all vendors and manufacturers along with the protocols committed have been made aware of the findings. These M2m Protocols vulnerabilities can be used as very effective tools for sabotage, pervasive data harvesting and other crimes.
Once again we repeat our recommendation — constantly check and apply for IoT security updates in order to protect yourself from hacking attempts.