Close
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Artificial Intelligence
  • Video
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity
    • Networking

    Nest Thermostat Security Risk Disclosed at Black Hat

    Written by

    Sean Michael Kerner
    Published August 6, 2014
    Share
    Facebook
    Twitter
    Linkedin

      eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More.

      LAS VEGAS—Among the most well-known Internet of things (IoT) devices in the consumer market is the Nest Learning Thermostat. According to research discussed at the Black Hat USA security conference here, there is also potential security risk with the thermostat that could enable a backdoor attack.

      In an interview with eWEEK, researcher Yier Jin from the University of Central Florida explained that he is particularly interested in the hardware security of IoT devices. His research team started by looking at the boot process for the Nest thermostat, which is where he found what he considers to be a backdoor.

      According to Jin, the backdoor his team found can bypass verification and enable an attacker to install a customized kernel that could run arbitrary code. The researchers found the backdoor on just the thermostat and not on the Nest Protect smoke detector. Nest Labs currently has just two products: the thermostat and the smoke detector. Nest itself was recently acquired by Google for $3.2 billion.

      On the Nest thermostat, Jin and his team were able to load their own firmware because there is no secure boot mechanism on the device. With secure boot, a device first checks the authenticity and integrity of a boot image before it is loaded.

      The only time Nest performs firmware verification is when a new software image is updated from the Nest Labs site for the user’s device. Nest Thermostat updates are cryptographically signed and if the signature is not valid, the software won’t boot.

      “Since our attack controls the boot process, we can bypass the Nest software stack and do whatever we want to do,” Jin said.

      From a technical perspective, Jin and his team didn’t actually replace the on-device Nest firmware. The thermostat has two partitions for running a software kernel, and there is also space for a different root filesystem.

      For its part, Nest Labs stressed that that security research conducted by Jin and his team requires physical access to the device. In a statement sent by Nest Labs to eWEEK, the company noted that Jin’s research is a physical jailbreak requiring physical access to the Nest Learning Thermostat.

      “It doesn’t compromise the security of our servers or the connections to them and to the best of our knowledge, no devices have been accessed and compromised remotely,” Nest stated.

      Even though physical access is required, there are some interesting things that can be done to the Nest thermostat.

      Jin said what his team has done at the preliminary stage is to just include additional functionality rather than remove any existing capabilities. Potentially it is possible to modify the code such that the device will not be able to connect directly to Nest Labs to get an update. It’s also a possibility that log files and data from the Nest can be obtained from the device.

      Looking at the Nest log files, Jin said that a lot of different information is collected. Running the Nest thermostat for one month, Jin was able to generate a 32MB log file. Log file information can include device setup information as well, which will include the location of the device and the type of house it is installed in.

      “They [Nest] probably know everything that is going on with a device, perhaps more than what we want Nest to know,” Jin said.

      One of the capabilities that Jin’s team can add to its custom Nest firmware is to actually block logs from being sent back to Nest Labs.

      Another item that is stored in the Nest thermostat is the local WiFi network’s access credentials. As such, if someone is able to gain access to the internals of the device, they might possibly be able to pivot to gain access to other parts of the same network.

      Jin has a simple suggestion on how to limit the risk of an internal network pivot—simply put the Nest thermostat on its own network. He explained that the Nest uses HTTP and a secure tunnel to send information back to Nest and it uses NTP (Network Time Protocol) for internal time.

      “If you can isolate the thermostat on the network, it’s probably a good idea.” Jin said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and writer for several leading IT business web sites.

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      Get the Free Newsletter!

      Subscribe to Daily Tech Insider for top news, trends & analysis

      MOST POPULAR ARTICLES

      Artificial Intelligence

      9 Best AI 3D Generators You Need...

      Sam Rinko - June 25, 2024 0
      AI 3D Generators are powerful tools for many different industries. Discover the best AI 3D Generators, and learn which is best for your specific use case.
      Read more
      Cloud

      RingCentral Expands Its Collaboration Platform

      Zeus Kerravala - November 22, 2023 0
      RingCentral adds AI-enabled contact center and hybrid event products to its suite of collaboration services.
      Read more
      Artificial Intelligence

      8 Best AI Data Analytics Software &...

      Aminu Abdullahi - January 18, 2024 0
      Learn the top AI data analytics software to use. Compare AI data analytics solutions & features to make the best choice for your business.
      Read more
      Latest News

      Zeus Kerravala on Networking: Multicloud, 5G, and...

      James Maguire - December 16, 2022 0
      I spoke with Zeus Kerravala, industry analyst at ZK Research, about the rapid changes in enterprise networking, as tech advances and digital transformation prompt...
      Read more
      Video

      Datadog President Amit Agarwal on Trends in...

      James Maguire - November 11, 2022 0
      I spoke with Amit Agarwal, President of Datadog, about infrastructure observability, from current trends to key challenges to the future of this rapidly growing...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2024 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×