The Protiviti View  | Insights From Our Experts on Trends, Risks and Opportunities

The Protiviti View

Insights From Our Experts on Trends, Risks and Opportunities
Search

POST

3 mins to read

Major Security Vulnerabilities Could Expose Thousands of IoT Devices to Cyberattacks (Flash Report)

Larger Font
3 minutes to read

IoT Vulnerabilities on the Rise

A recently discovered set of Bluetooth-related vulnerabilities could mean thousands of IoT devices are vulnerable to attack and could experience deadlocks, crashes, buffer overflows and bypass of certain security settings. Researchers at the Singapore University of Technology and Design uncovered a set of 12 vulnerabilities affecting seven major system-on-a-chip (SoC) vendors whose chips are contained in more than 480 different IoT devices. The review was not exhaustive, therefore potentially thousands of devices may be affected. Additionally, these SoC chipsets are some of the most popular in the world, so there is a high likelihood that many organizations have affected devices deployed in their environment and may be at risk. Protiviti has begun reviewing the vulnerabilities in our own security lab, and has validated that they are a serious, credible threat.

Download the Protiviti Flash Report

Potentially impacted devices include, but are not limited to:

  • Medical devices
  • Building automation
  • Security systems
  • Automotive devices
  • Connected lighting devices
  • Smart home products
  • Consumer electronics

The researchers also published proof-of-concept exploit code, meaning they have demonstrated how the vulnerabilities can be exploited, and have made the code freely available to the public. This greatly increases the probability that cyber criminals will attempt to abuse these vulnerabilities in the near future. Organizations should immediately take action to determine if they have affected devices deployed in their environment and, if so, take steps to patch them or mitigate the risk of exploit.

The vulnerabilities affect the Bluetooth Low Energy (BLE) implementation within SoC chipsets. Bluetooth Low Energy is a wireless communication method that allows IoT and user devices such as a smartphone or iPad to communicate when the devices are within radio range (typically 10 to 20 meters). The identified vulnerabilities have different impacts ranging from crashing the device or causing it to lock and require a restart, to security control bypasses which can allow the attacker to write or read potentially sensitive data to or from the device, impact the confidentiality and integrity of transmitted data, and potentially modify or change settings and functions on the device. While all of these attack types could have major impact depending on the type or function of the device and processes it performs, the security bypass attack can have dramatic affects, some of which could have a serious impact on health, safety and security.

What Should Organizations Do?

Companies that use or manufacture Bluetooth-enabled IoT devices should review the research for additional information, including specific details identifying the affected SoC chipsets, and take immediate action. Recommended measures include:

  • Review IoT device inventory and determine if any of the devices use the affected chips.
  • Contact the device vendors to determine if devices are affected by the vulnerabilities.
  • For devices that have BLE capabilities, rank/prioritize devices in terms of need and potential impact to the business and determine if their BLE functionality can be disabled.
  • If BLE cannot be disabled, ask the device vendor if a patch has been released or will be released, as well as the anticipated timeframe and how to apply the patch.
  • For affected systems that cannot be patched, develop compensating controls such as restricting physical access to the devices to prevent an attacker from getting within BLE range.
  • Monitor these devices for anomalous activity and educate users to be aware of the associated risks and attack methods.

While the research revealed an immediate need to review and manage the security of IoT devices employing specific SoC chipsets, it points to an even bigger need for a sound security strategy in this area. As the use of IoT becomes more pervasive and organizations employ more of these devices in their environments and businesses, it is important to remember that the security of these devices is not yet well understood. These devices carry unique risks that need to be managed, including a risk to confidential data. Organizations should develop an IoT strategy for managing, maintaining, securing and retiring IoT devices in their environments. The plan should include full lifecycle management of the devices from procurement through retirement, and should cover key controls such as asset management, security configuration, updates, secure communications, monitoring, resiliency and retirement. IoT devices should also be included in the organization’s risk assessment so appropriate resources can be applied to manage the business risk this emerging technology presents to the organization.

Companies manufacturing or using IoT technology should consider several key questions:

  • Does your company have an inventory of current assets with IoT capabilities being used within the organization?
  • Do you have the capability to identify potential threats or monitor suspicious traffic on these devices?
  • Do you have a plan and the skills and ability to update IoT devices if a security vulnerability is identified?
  • Do you have controls in place to manage security and risks that IoT introduces to an organization?
  • Do you have a technology and business resiliency plan?

To learn more about IoT devices, visit our website. A PDF version of the Flash Report is available here.

Was this post helpful to you?

Thanks for your feedback!

Subscribe to The Protiviti View Blog

To face the future confidently, you need to be equipped with valuable insights that align with your interests and business goals.

In this Article

Find a similar post by topics

Authors

The Protiviti View

By The Protiviti View

Verified Expert at Protiviti

EXPERTISE

No noise.
Just insights.

Subscribe now

Related posts

Article

What is it about

The big picture: C-suite leaders in traditional aerospace and defense (A&D) companies are launching and growing their aftermarket services and...

Article

What is it about

What to watch: President-elect Donald Trump will take office in January 2025 with Republican control of both the Senate and...

Article

What is it about

What’s new: HR leaders are having to rethink and relearn traditional rewards strategies in response to the growing need to...