Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

07:00 PM
Connect Directly

Most IoT Hardware Dangerously Easy to Crack

Manufacturers need to invest more effort into protecting root-level access to connected devices, security researcher says.

A vast majority of IoT hardware in homes and offices is vulnerable to attacks that allow devices to be easily taken over and manipulated for malicious purposes.

Few device manufacturers or security researchers are paying nearly as much attention to this issue as they are to software vulnerabilities, according to Marc Rogers, white hat hacker and executive director of cybersecurity at Okta.

In a presentation at Okta's virtual Disclosure security conference on Wednesday, Rogers described most IoT hardware as having very weak to no protections against attacks aimed at prying secrets from device firmware.

Related Content:

How to Assess More Sophisticated IoT Threats

Third-Party IoT Vulnerabilities: We Need a Cybersecurity Paradigm Shift

Rogers claimed he was able to gain complete root level access, including the ability to re-flash firmware, on 10 out of 12 devices he tested. Most were cracked in less than five minutes, he said. The products he tested included home routers, switches, card access readers, and other commonly installed Internet-connected devices.

The issue with all of these systems, and indeed all IoT devices, is that most proprietary information about the device — including certificates, keys, and communication protocols — is typically stored in poorly secured flash memory. Anyone with access to an IoT device and some basic knowledge of hardware hacking can easily access the firmware and look for data, including vulnerabilities that could potentially allow them to launch attacks against similar devices without requiring physical access, Rogers explained.

According to Rogers, the techniques he used to hack into these devices are well understood and have been around for a long time. "What is less known is how easily accessible and devastatingly effective they are," he explained. "I don't think I have seen one IoT device where at least one of these techniques doesn't apply," Rogers said in an interview with Dark Reading.

In his talk, Rogers outlined a few approaches that are available to hackers to pry proprietary information from an IoT device and take control of it in a manner not intended by the device manufacturer.

The UART and JTAG Routes

One of the easiest methods is to gain access to UART, or Universal Asynchronous Receiver/Transmitter, a serial interface used for diagnostic reporting and debugging in all IoT products, among other things. An attacker can use the UART to gain root shell access to an IoT device and then download the firmware to learn its secrets and inspect for weaknesses.

"UART is only supposed to be used by the manufacturer. When you get access to it, in most cases you get complete root access," Rogers said. 

Protecting access to UART, or at least configuring it against interactive access, should be a fairly straightforward task for manufacturers; however, most don't make the effort. "They simply allow you to have complete interactive shell. It is the easiest way to hack every piece of IoT hardware," Rogers noted. Several devices even have UART pin names labeled on the board so it is easy to find the interface. Multiple tools are available to help find them if they are not labeled.

Another, only slightly more challenging, route to completely pwning an IoT device is via JTAG, a microcontroller-level interface that is used for multiple purposes including testing integrated circuits and programming flash memory. As with UART, an attacker with access to JTAG can alter flash memory, access debug tools, and extract other proprietary information about the device.

Though the JTAG interface can be slightly harder to find than UART, it still is easy enough to discover for those who know what to look for or have the tools to do it for them, according to Rogers. There are steps that manufacturers can take to lock JTAG down, and indeed they do for some modern devices, but most still provide relatively easy access to JTAG, he said.

When manufacturers have tried to make access to UART and other interfaces harder, their attempts have been amateurish. As one example, Rogers pointed to an IoT device manufacturer that disguised the UART interface as an HDMI port. He cited another example in which the programming interface for a microcontroller, which stored the master key for a widely used access card reader, was hidden under a piece of black electrical tape at the back.

"Hardware manufacturers have got to stop trying to hide these hardware problems," he emphasized.

Just as security researchers' intense scrutiny on smart car technologies is driving change, there is need for similar focus on IoT hardware weaknesses. Technologies are available that allow manufacturers to build more secure hardware, and costs to do so are dropping. "We really don't have much excuse not to implement some security into hardware," Rogers said. 

Jai Vijayan is a seasoned technology reporter with over 20 years of experience in IT trade journalism. He was most recently a Senior Editor at Computerworld, where he covered information security and data privacy issues for the publication. Over the course of his 20-year ... View Full Bio

Recommended Reading:

Comment  | 
Print  | 
More Insights
Newest First  |  Oldest First  |  Threaded View
When It Comes To Security Tools, More Isn't More
Lamont Orange, Chief Information Security Officer at Netskope,  1/11/2021
US Capitol Attack a Wake-up Call for the Integration of Physical & IT Security
Seth Rosenblatt, Contributing Writer,  1/11/2021
IoT Vendor Ubiquiti Suffers Data Breach
Dark Reading Staff 1/11/2021
Register for Dark Reading Newsletters
White Papers
Current Issue
2020: The Year in Security
Download this Tech Digest for a look at the biggest security stories that - so far - have shaped a very strange and stressful year.
Flash Poll
Assessing Cybersecurity Risk in Today's Enterprises
Assessing Cybersecurity Risk in Today's Enterprises
COVID-19 has created a new IT paradigm in the enterprise -- and a new level of cybersecurity risk. This report offers a look at how enterprises are assessing and managing cyber-risk under the new normal.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
PUBLISHED: 2021-01-17
An issue was discovered in Quali CloudShell 9.3. An XSS vulnerability in the login page allows an attacker to craft a URL, with a constructor.constructor substring in the username field, that executes a payload when the user visits the /Account/Login page.
PUBLISHED: 2021-01-17
Netsia SEBA+ through 0.16.1 build 70-e669dcd7 allows remote attackers to discover session cookies via a direct /session/list/allActiveSession request. For example, the attacker can discover the admin's cookie if the admin account happens to be logged in when the allActiveSession request occurs, and ...
PUBLISHED: 2021-01-15
An issue was discovered in Malwarebytes before 4.0 on macOS. A malicious application was able to perform a privileged action within the Malwarebytes launch daemon. The privileged service improperly validated XPC connections by relying on the PID instead of the audit token. An attacker can construct ...
PUBLISHED: 2021-01-15
Docker Desktop Community before on macOS mishandles certificate checking, leading to local privilege escalation.
PUBLISHED: 2021-01-15
OneDev is an all-in-one devops platform. In OneDev before version 4.0.3, there is a critical vulnerability which can lead to pre-auth remote code execution. AttachmentUploadServlet deserializes untrusted data from the `Attachment-Support` header. This Servlet does not enforce any authentication or a...