
vices were found to be the most vulnerable, while the
Google Home Mini was the most secure. The study
concludes that the framework can be used by non-
experts, contributing to improved IoT security and
safer smart homes.
Researchers are also exploring various approaches
to enhance the security levels of the IoT. For example,
Hassija et al. (Hassija et al., 2019) show how four dif-
ferent technologies, i.e., blockchain, fog computing,
edge computing, and machine learning, can be used
to increase the level of security in IoT, solving some
of the main security issues present in the four layers
in which an IoT application can be divided, which are
sensing layer, network layer, middleware layer, and
application layer. Finally, Salah and Khan (Salah and
Khan, 2017) present and survey major security issues
for the IoT environment and show how blockchain
can solve many of them.
2.1 Previous Attacks on Tapo Bulbs
Previous work on Tapo L530E smart bulbs (Bonaven-
tura. et al., 2023) delineates the communication pro-
cess between Tapo devices and the Tapo app, com-
prising three primary macro-steps: (1) Device Dis-
covery - allows the Tapo app to locate the Tapo device
within the local network, and to get the Tapo device’s
configuration; (2) Tapo Symmetric Key Exchange Pro-
tocol (TSKEP) - allows the Tapo app and the Tapo de-
vice to exchange a symmetric session key; (3) Tapo
device usage - allows the user to use the Tapo device
via the Tapo app, by sending get and set messages.
Within these macro-steps, authors identify and ex-
plain four vulnerabilities:
• Vulnerability 1. Lack of authentication of the
Tapo device with the Tapo app allows an adjacent
attacker to impersonate the Tapo device with the
Tapo app during the TSKEP step.
• Vulnerability 2. Hard-coded, short shared secret
allows an adjacent attacker to obtain the secret for
authentication during the Device Discovery phase.
• Vulnerability 3. Lack of randomness during sym-
metric encryption allows an adjacent attacker to
make the AES128-CBC scheme deterministic.
• Vulnerability 4. Insufficient message freshness al-
lows an adjacent attacker to replay messages both
to the Tapo device and the Tapo app.
These vulnerabilites were exploited by the authors in
five attack scenarios, which we hereby summarise:
• Attack Scenario 1, Fake Bulb Discovery Messages
Generation, that allows to discover Tapo devices
within the network and serve false configurations
to the Tapo app.
• Attack Scenario 2, Password Exfiltration from
Tapo User Account, that allows to get the pass-
word in cleartext of the user’s Tapo account, and
its associated email account in hash form.
• Attack Scenario 3, MITM Attack with a Config-
ured Tapo L530E, that allows to perform a Man-
in-the-Middle attack and violate the confidential-
ity and integrity of all messages exchanged be-
tween the Tapo app and the Tapo device. This
results in the exfiltration of the Tapo account pass-
word in cleartext, and the associated email ac-
count in hash form.
• Attack Scenario 4, Replay Attack with the Smart
Bulb as Victim, that allows to replay previously in-
tercepted messages. If the adversary can observe
the smart bulb’s behaviour when the message ar-
rives, they can infer the message’s meaning and
reuse it at will.
• Attack Scenario 5, MITM Attack with an Un-
configured Tapo L530E, that allows to perform a
Man-in-the-Middle attack and intercept traffic be-
tween the Tapo app and the Tapo device during
configuration. As Tapo username and password,
together with the Wi-Fi SSID and Wi-Fi password
are sent in Base64 encoding during configuration,
the adversary is able to exfiltrate all information.
Finally, the authors conduct experiments across
three different network setups, denoted as Setup A,
Setup B, and Setup C. In Setup A, both the victim
(i.e., a phone running the Tapo app) and the adversary
are connected to the same network, while the Tapo
device is on a separate, remote network; in Setup B,
the adversary, the victim and the Tapo device are all
connected to the same local network, and the Tapo de-
vice is already configured; in Setup C, the adversary
keeps deauthenticating (Bellardo and Savage, 2003)
the Tapo device, resetting it to the unconfigured state,
until the user connects it to the adversary’s Wi-Fi hon-
eypot, thinking it’s their home network.
3 BREACHING THE
HOUSEHOLD AGAIN
In this section, we present a novel attack scenario,
which we call “Attack Scenario 6 - Passwords exfil-
tration with an unconfigured Tapo device”, following
the enumeration within previous work on Tapo de-
vices (Bonaventura. et al., 2023). In this new attack
scenario, the adversary is able to exfiltrate passwords
using an unconfigured Tapo device.
The devices used during the attack are:
The IoT Breaches Your Household Again
477