Authors:
Davide Bonaventura
1
;
Sergio Esposito
2
and
Giampaolo Bella
1
Affiliations:
1
Dipartimento di Matematica e Informatica, Università di Catania, Catania, Italy
;
2
Information Security Group, Royal Holloway, University of London, Egham, U.K.
Keyword(s):
IoT, Smart Homes, Smart Devices, Smart Bulb, Penetration Test, Vulnerability Assessment.
Abstract:
The IoT is getting more and more pervasive. Even the simplest devices, such as a light bulb or an electrical plug, are made “smart” and controllable by our smartphone. This paper describes the findings obtained by applying the PETIoT kill chain to conduct a Vulnerability Assessment and Penetration Testing session on a smart bulb, the Tapo L530E by Tp-Link, currently best seller on Amazon Italy. We found that four vulnerabilities affect the bulb, two of High severity and two of Medium severity according to the CVSS v3.1 scoring system. In short, authentication is not well accounted for and confidentiality is insufficiently achieved by the implemented cryptographic measures. In consequence, an attacker who is nearby the bulb can operate at will not just the bulb but all devices of the Tapo family that the user may have on her Tapo account. Moreover, the attacker can learn the victim’s Wi-Fi password, thereby escalating his malicious potential considerably. The paper terminates with an
outline of possible fixes.
(More)