Remix.run Logo
perching_aix 4 hours ago

I keep reading about how IoT / wearables / smart home devices are routinely both vulnerable and exploited, if not even come with malware preinstalled, so I was curious to finally go through a primary source like this.

After skimming through the attacks performed in this research, and checking every mention of the word "internet", all I got was a section with a hypothetical scenario where the watch has a publicly reachable IPv4 address. Suffice to say, that is really quite unlikely, certainly in my experience at least.

It did also talk about bundled malware, so I guess that's bad enough, but is all IoT research like this? Always sounded to me like you kinda need to already have a foot in the door for these, and this paper didn't dispel that notion for me at all.

tlb an hour ago | parent | next [-]

Many of the great hacks have involved breaking through 2 layers of supposed security. You break into the 3D printer, which lets you send packets on the local network. Then you use that to break into the exercise bike, which has a camera because it's based on a generic tablet.

Either vendor might see the flaw as low-severity. So what if someone can send packets? So what if someone already on the local network can hack the camera? But combine them and you're pwned.

pixl97 4 hours ago | parent | prev | next [-]

"You're safe as long as every device on the network you're on is safe" isn't safe.

In theory I should be able to take a modern browser/device over a completely compromised router and either be safe, or have my device tell me "holy shit, something is wrong".

The days of local trust should be long gone by now.

perching_aix 4 hours ago | parent | next [-]

Sure, just super not what I think of when I read the headlines. I read the headlines and I expect the things to be on Shodan.

wslh 29 minutes ago | parent | prev [-]

You are safe until you are a real target. The exploit someone have ready for your safe browser was not used yet in the wild.

parliament32 3 hours ago | parent | prev | next [-]

> a hypothetical scenario where the watch has a publicly reachable IPv4 address

Or one of your other IoT / smart home devices / malware on your PC is doing local network reconnaissance? Connecting this device to a public wifi? Or just a bad neighbour who hijacks your SSID? This smells of "I'm secure because I'm behind a NAT" which conveniently ignores the couple dozen other paths an adversary could take.

perching_aix an hour ago | parent | next [-]

Edit: maybe where I was coming from is not entirely clear, tried specifying it better here: https://news.ycombinator.com/item?id=47255003

========

I can materialize that smell for you, you're indeed more secure because you're behind NAT. Admitting this does not necessarily entail:

- suggesting that it's a good security solution

- suggesting that it's a security solution to begin with

- suggesting that it somehow prevents all avenues of remote exploitation

What it does do is make these stories sound a lot less dramatic. Because no, John Diddler is not going to be able to just hop on and get into your child's smartwatch to spy on them from the comfort of their home on the other side of the world at a whim, unlike these headlines and articles suggest at a glance. Not through the documented exploitation methods alone anyways, unless my skim reading didn't do the paper justice.

Remaining remote exploitation avenues do include however:

- the vendor getting compromised, and through it the devices pulling in a malicious payload, making them compromised (I guess this kinda either did happen or was simulated in the paper, but this is indirect and kind of benign anyways; you implicitly trust the vendor every time you apply a software update since it's closed source)

- the vendor being a massive (criminal?) doofus and just straight up providing a public or semi-public proxy endpoint, with zero or negligent auth, through which you can on-demand enumerate and reach all the devices (this is primarily the avenue I was expecting, as there was a car manufacturer I believe who did exactly this)

- peer to peer networking shenanigans: not sure what's possible there, can't imagine there not being any skeletons in the closet, would have been excited to learn more

List not guaranteed complete. But this is the kinda stuff I'd be expecting when I see these headlines.

groby_b 3 hours ago | parent | prev [-]

Sure. Or you might step out the door and a fridge falls on you. Equally likely.

Yes, it's an exploit. It should be fixed. But the endless hyperventilating over fringe exploits mostly has the effect that people now ignore all security conversations.

e12e an hour ago | parent | prev | next [-]

> the watch has a publicly reachable IPv4 address

Attacker reachable, presumably? Like from a hacked cable modem or wifi router?

perching_aix 29 minutes ago | parent [-]

I guess I managed to mention everything but what I was actually, specifically fishing for: I wanted to confirm this claim and claims like it:

> The watch had an insecure network service that anyone could access via the internet.

nickthenerd 4 hours ago | parent | prev | next [-]

The source site/paper won't load for me at this time, but if the device has a cellular modem in it for network connectivity, it will 100% be assigned an IPv4 address from the carrier. Unless this device is using an APN at the carrier level, or is using a SIM provider that provides some additional security.

nandomrumber 3 hours ago | parent [-]

Sure, but that’s increasingly likely to be a private IPv4 address as a result of:

Carrier-grade NAT (CGN or CGNAT), also known as large-scale NAT (LSN), is a type of network address translation (NAT) used by Internet service providers (ISPs) in IPv4 network design. With CGNAT, end sites, in particular residential networks, are configured with private network addresses that are translated to public IPv4 addresses by middlebox network address translator devices embedded in the network operator's network, permitting the sharing of small pools of public addresses among many end users. This essentially repeats the traditional customer-premises NAT function at the ISP level.

Having said that, NAT isn’t a firewall.

wnevets 4 hours ago | parent | prev [-]

> Suffice to say, that is really quite unlikely, certainly in my experience at least.

Why is that? Are the cellular carriers blocking access?

perching_aix an hour ago | parent [-]

Because just like all other types of ISPs, they usually put their customers behind cgNAT.

craftkiller an hour ago | parent [-]

You must not be in the United States. Here, regular home cable/fiber internet ISPs usually assign a (dynamic) public ipv4 address to your router. Your cellular internet connection is usually behind cgnat, both on your phone and the new home wireless internet from the cellular providers, but regular home cable/fiber internet is the most common home internet type.

So I agree that the watch would likely be behind NAT (for IPv4), I just disagree with the statement that ISPs usually put their customers behind cgnat.