ITC Awards
Menu
HP warns of deep security issues with emerging IoT technology

HP warns of deep security issues with emerging IoT technology

100 per cent of internet-connected security systems contain significant vulnerabilities

One hundred per cent of internet-connected security systems contain significant vulnerabilities, according a new HP study.

The HP Fortify study found that all of the studied devices used in home security have serious security flaws as a result of being online, including password security, encryption and authentication issues.

Home security systems, such as video cameras and motion detectors, have gained popularity as they have joined the booming Internet of Things (IoT) market.

Gartner forecasts that 4.9 billion connected things will be in use in 2015, up 30 per cent from 2014, and will reach 25 billion by 2020.

The study reveals how ill-equipped the market is from a security standpoint for the magnitude of growth expected around IoT.

Manufacturers are quickly bringing to market connected security systems that deliver remote monitoring capabilities.

The network connectivity and access necessary for remote monitoring presents new security concerns that did not exist for the previous generation of systems that have no internet connectivity.

The HP study questions whether connected security devices actually make our homes safer or put them at more risk by providing easier electronic access via insecure IoT products.

It leveraged HP Fortify on Demand to assess 10 home security IoT devices along with their Cloud and mobile application components.

It found none of the systems required the use of a strong password and 100 per cent of the systems failed to offer two-factor authentication.

All systems that included their Cloud-based web interfaces and mobile interfaces failed to require passwords of sufficient complexity and length with most only requiring a six character alphanumeric password. All systems also lacked the ability to lock out accounts after a certain number of failed attempts.

Further, all Cloud-based Web interfaces tested exhibited security concerns enabling a potential attacker to gain account access through account harvesting which uses three application flaws: account enumeration, weak password policy and lack of account lockout.

Similarly five of the ten systems tested exhibited account harvesting concerns with their mobile application interface exposing consumers to similar risks.

All systems collected some form of personal information such as name, address, date of birth, phone number and even credit card numbers.

Exposure of this personal information is of concern given the account harvesting issues across all systems. It is also worth noting that the use of video is a key feature of many home security systems with viewing available via mobile applications and Cloud-based web interfaces. The privacy of video images from inside the home becomes an added concern.

While all systems implemented transport encryption such as SSL/TLS, many of the Cloud connections remain vulnerable to attacks (e.g. POODLE attack). The importance of properly configured transport encryption is especially important since security is a primary function of these systems.

HP Software, general manager, enterprise security products, South Pacific, Shane Bellos, said as we continued to embrace the convenience and availability of connected devices, we must understand how vulnerable they could make our homes and families.

“With ten of the top security systems lacking fundamental security features, consumers must be diligent about adopting simple and practical security measures when they’re available, and device manufacturers must take ownership in building security into their products to avoid exposing their customers unknowingly to serious threats.”

As IoT product manufacturers work to incorporate much needed security measures, consumers are urged to consider security when choosing a monitoring system for their home.

Implementing secure home networks before adding insecure IoT devices, instituting complex passwords, account lockouts and two-factor authentication are only a few measures consumers can take to make their IoT experience more secure.

Follow Us

Join the ARN newsletter!

Error: Please check your email address.

Tags Internet of Things (IoT)Shane BellossecurityvulnerabilitySouth PacificHP softwaresecurity systemsIoTEnterprise Security Productsgeneral manager

iasset.com is a channel management ecosystem that automates all major aspects of the entire sales, marketing and service process, including data tracking, integrated learning, knowledge management and product lifecycle management.

Show Comments