Close
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
Read Down
Sign in
Close
Welcome!Log into your account
Forgot your password?
Read Down
Password recovery
Recover your password
Close
Search
Logo
Logo
  • Latest News
  • Big Data and Analytics
  • Cloud
  • Networking
  • Cybersecurity
  • Applications
  • IT Management
  • Storage
  • Sponsored
  • Mobile
  • Small Business
  • Development
  • Database
  • Servers
  • Android
  • Apple
  • Innovation
  • Blogs
  • PC Hardware
  • Reviews
  • Search Engines
  • Virtualization
More
    Home Cybersecurity
    • Cybersecurity

    Rapid7 Reveals Telepresence Robot IoT Vulnerabilities

    By
    Sean Michael Kerner
    -
    March 13, 2017
    Share
    Facebook
    Twitter
    Linkedin
      security prepared

      Once again, the security risks associated with internet of things (IoT) connected devices are being scrutinized, as Rapid7 has publicly disclosed multiple vulnerabilities in Double Robotics devices.

      Double Robotics, a vendor of mobile telepresence robots that help to enable people to communicate in an innovative way, has already patched two out of the three security issues that Rapid7 has responsibly disclosed. Rapid7 first reported the vulnerabilities to Double Robotics on Jan. 9. To its credit, Double Robotics moved rapidly to address the vulnerabilities and had patches out on Jan. 16.

      “Even though these issues are fixed, we disclose issues like these primarily so other developers out there can learn about common gotchas that might be relevant to their projects,” Deral Heiland, IoT research lead at Rapid7, told eWEEK.

      From a timing perspective, given that Double Robotics patched the issues in January, Rapid7 could have disclosed what it found sooner. However, Heiland said that even though his company could disclose vulnerabilities as soon as a vendor issues fixes, he doesn’t want to get in a situation where vendors that are fast and responsive are penalized with an early disclosure.

      “We like to stick to the 60-day clock we talk about in our disclosure policy as closely as we can, patches or not,” Heiland said.

      Rapid7 identified one of the flaws as an unauthenticated access to data vulnerability. Heiland explained that physical access to devices is needed to enumerate the data from the cloud APIs in this exploit. He added that remote attackers can have full access to the data in the cloud if they know where to look.

      The second issue identified by Rapid7 is a static user session management vulnerability that, if compromised, could have enabled an attacker to take control of a Double Telepresence Robot without the need for a user account or password. Heiland said this vulnerability assumes some access to information, specifically the “Robot Key,” which can be obtained locally on the robot or through a man in the middle attack.

      “With the Robot Key, an unauthenticated user could query the cloud API and return the user keys for all authorized users allowed to remote control the robot,” he said. “A malicious actor can then use those user keys as session cookies within the robot remote control application, allowing full remote control of the robot.”

      Double Robotics has patched both the static user session management issue and the unauthenticated access vulnerability. The third issue—identified by Rapid7 as a weak Bluetooth pairing vulnerability—however has not been patched as Double Robotics doesn’t see it as a major risk factor. According to Rapid7’s disclosure, the pairing process between the mobile application for the Double Telepresence Robot and the robot drive unit does not require the user to know the challenge PIN.

      “This can be abused with any iPad device running the Double Robot application,” Heiland said. “The user would need to be within close proximity, but a malicious actor could easily use a large antenna to expand that range out significantly.”

      The issue of weak Bluetooth pairing is not uncommon with many different types of IoT devices that Rapid7 has tested. In this case, Heiland set up the Double Robot application on an iPad and paired it up to the device in his possession, which allowed him to register the robot a second time under his name. There was no need to validate who he was or whether he owned the robot.

      While the weak Bluetooth pairing flaw is a common issue, mitigating risk is also relatively straightforward. Heiland suggests that users make sure that the attached mobile control device is not powered off. If it is powered off, also power off the device’s drive unit.

      “Only one device can pair to the drive unit, so it’s important to ensure that it is the correct iPad control device that remains paired,” Heiland said.

      Sean Michael Kerner is a senior editor at eWEEK and InternetNews.com. Follow him on Twitter @TechJournalist.

      Sean Michael Kerner
      Sean Michael Kerner is an Internet consultant, strategist, and contributor to several leading IT business web sites.

      MOST POPULAR ARTICLES

      Big Data and Analytics

      Alteryx’s Suresh Vittal on the Democratization of...

      James Maguire - May 31, 2022 0
      I spoke with Suresh Vittal, Chief Product Officer at Alteryx, about the industry mega-shift toward making data analytics tools accessible to a company’s complete...
      Read more
      Cybersecurity

      Visa’s Michael Jabbara on Cybersecurity and Digital...

      James Maguire - May 17, 2022 0
      I spoke with Michael Jabbara, VP and Global Head of Fraud Services at Visa, about the cybersecurity technology used to ensure the safe transfer...
      Read more
      Cloud

      IGEL CEO Jed Ayres on Edge and...

      James Maguire - June 14, 2022 0
      I spoke with Jed Ayres, CEO of IGEL, about the endpoint sector, and an open source OS for the cloud; we also spoke about...
      Read more
      Applications

      Cisco’s Thimaya Subaiya on Customer Experience in...

      James Maguire - May 10, 2022 0
      I spoke with Thimaya Subaiya, SVP and GM of Global Customer Experience at Cisco, about the factors that create good customer experience – and...
      Read more
      Cloud

      Yotascale CEO Asim Razzaq on Controlling Multicloud...

      James Maguire - May 5, 2022 0
      Asim Razzaq, CEO of Yotascale, provides guidance on understanding—and containing—the complex cost structure of multicloud computing. Among the topics we covered:  As you survey the...
      Read more
      Logo

      eWeek has the latest technology news and analysis, buying guides, and product reviews for IT professionals and technology buyers. The site’s focus is on innovative solutions and covering in-depth technical content. eWeek stays on the cutting edge of technology news and IT trends through interviews and expert analysis. Gain insight from top innovators and thought leaders in the fields of IT, business, enterprise software, startups, and more.

      Facebook
      Linkedin
      RSS
      Twitter
      Youtube

      Advertisers

      Advertise with TechnologyAdvice on eWeek and our other IT-focused platforms.

      Advertise with Us

      Menu

      • About eWeek
      • Subscribe to our Newsletter
      • Latest News

      Our Brands

      • Privacy Policy
      • Terms
      • About
      • Contact
      • Advertise
      • Sitemap
      • California – Do Not Sell My Information

      Property of TechnologyAdvice.
      © 2022 TechnologyAdvice. All Rights Reserved

      Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.

      ×