Discussion
A KTH student hacked a children's watch
coredev_: I'm very excited for EUs CRA, very promising for the future of digital security in the EU.
defraudbah: which smartwatch was that?the source linked in the article is dead, and I only see that AI slop comment here-- MyFirst Fone R1, singaporefunny that it's called my first, find my first upon your device, haha
pavel_lishin: https://kth.diva-portal.org/smash/record.jsf?pid=diva2%3A203...> In this thesis, welldocumented grey-box ethical hacking is conducted of the network service and firmware attack surfaces of the children’s smartwatch myFirst Fone R1s.
john_strinlai: presumably, "CRA" in this comment stands for "Cyber Resilience Act" (https://digital-strategy.ec.europa.eu/en/policies/cyber-resi...)
j45: Someone really needs to make a watch for kids sans touchscreen but with enough features for parents.
perching_aix: I keep reading about how IoT / wearables / smart home devices are routinely both vulnerable and exploited, if not even come with malware preinstalled, so I was curious to finally go through a primary source like this.After skimming through the attacks performed in this research, and checking every mention of the word "internet", all I got was a section with a hypothetical scenario where the watch has a publicly reachable IPv4 address. Suffice to say, that is really quite unlikely, certainly in my experience at least.It did also talk about bundled malware, so I guess that's bad enough, but is all IoT research like this? Always sounded to me like you kinda need to already have a foot in the door for these, and this paper didn't dispel that notion for me at all.
pixl97: "You're safe as long as every device on the network you're on is safe" isn't safe.In theory I should be able to take a modern browser/device over a completely compromised router and either be safe, or have my device tell me "holy shit, something is wrong".The days of local trust should be long gone by now.
wnevets: > Suffice to say, that is really quite unlikely, certainly in my experience at least.Why is that? Are the cellular carriers blocking access?
nickthenerd: The source site/paper won't load for me at this time, but if the device has a cellular modem in it for network connectivity, it will 100% be assigned an IPv4 address from the carrier. Unless this device is using an APN at the carrier level, or is using a SIM provider that provides some additional security.
parliament32: > a hypothetical scenario where the watch has a publicly reachable IPv4 addressOr one of your other IoT / smart home devices / malware on your PC is doing local network reconnaissance? Connecting this device to a public wifi? Or just a bad neighbour who hijacks your SSID? This smells of "I'm secure because I'm behind a NAT" which conveniently ignores the couple dozen other paths an adversary could take.
perching_aix: I can materialize that smell for you, you're indeed more secure because you're behind NAT. Admitting this does not necessarily entail:- suggesting that it's a good security solution- suggesting that it's a security solution to begin with- suggesting that it somehow prevents all avenues of remote exploitationWhat it does do is make these stories sound a lot less dramatic. Because no, John Diddler is not going to be able to just hop on and get into your child's smartwatch to spy on them from the comfort of their home on the other side of the world. Not through the documented exploitation methods alone anyways, unless my skim reading didn't do the paper justice.Remaining remote exploration avenues do include however:- the vendor gets compromised, and through it the devices pull in a malicious payload, making them compromised (I guess this kinda either did happen or was simulated in the paper, but this is indirect)- the vendor is a massive (criminal?) doofus and just straight up provides a public or semi-public proxy endpoint, with zero or negligent auth, through which you can on-demand enumerate and reach all the devices (this is primarily the avenue I was expecting, as there was a car manufacturer I believe who did exactly this)- peer to peer networking shenanigans: not sure what's possible there, can't imagine there not being any skeletons in the closet, would have been excited to learn moreList not guaranteed complete. But this is the kinda stuff I'm expecting when I see these headlines.
e12e: > the watch has a publicly reachable IPv4 addressAttacker reachable, presumably? Like from a hacked cable modem or wifi router?
perching_aix: I guess I managed to mention everything but what I was actually, specifically fishing for: I wanted to confirm this claim and claims like it:> The watch had an insecure network service that anyone could access via the internet.
wslh: You are safe until you are a real target.
manbash: This paper seems like something I would like to keep as reference, especially with its approach to employ STRIDE and present very elaborate DFD (which you don't see as often in my experience).The DFD in 7.1 is quite impressive.
tiahura: for the same price you could get a used apple watch and set it up in kid mode.
quinnjh: Article was a bit of a nothingburger for the technically inclined.Digging into the paper, the significant finding (RCE) is achieved via:A payload was written which installs a reverse shell backdoor for root persistence. The payload was sent from a computer hosting a Wi-Fi to which the watch was connected, to ensure the watch had a reachable IPv4 address. The program ncat was used both to send the payload to the watch's network service, and to catch reverse shell connections.So if i understand this- it requires the watch being connected to a compromised AP. Anyone get a different read?
fc417fc802: > it requires the watch being connected to a compromised APNope. It simply requires that you are able to talk to the watch. So any device on the LAN should do. That's a disturbingly low bar for a wearable.
protonbob: The phenomenon of google dorks would say otherwise.
jidoka: Title: KTH student hacked a popular children’s smartwatch, found 17 vulnerabilities and full remote accessA former student at KTH Royal Institute of Technology has demonstrated how a popular children’s smartwatch can be fully compromised over the internet. In his thesis, “Ethical Hacking of a Smartwatch for Kids: A Hacker’s Playground,” Gustaf Blomqvist conducted an ethical security assessment of a widely sold kids’ smartwatch and found what he describes as severe security flaws.The device, identified in Swedish media as the MyFirst Fone R1s by MyFirst, exposed an insecure network service directly to the internet. By scanning for devices, an attacker could identify watches and take complete control of them remotely.According to the findings, an attacker could access the camera and microphone, eavesdrop on surroundings, read and manipulate text messages, send arbitrary messages, and potentially use the device in denial-of-service attacks. In total, 17 vulnerabilities were discovered.Blomqvist also found preinstalled malicious code on the watch. The device reportedly connected periodically to a remote server and transmitted detailed information about its contents. The update mechanism for that code was itself vulnerable, making it possible to install additional malicious software.Children’s smartwatches are marketed primarily as safety devices so that parents can stay in contact with their children. However, the research suggests these products may introduce serious privacy and security risks instead.Blomqvist says he reported the vulnerabilities to the manufacturer and initially received instructions on where to submit the details, but after that communication stopped. Pontus Johnson, professor of cybersecurity at KTH, commented that many software-based systems remain highly vulnerable and that smaller manufacturers may lack the resources to properly address security issues.The EU Cyber Resilience Act introduces mandatory cybersecurity requirements for connected products, but full enforcement will not take effect until 2027.Sources: kth.se, expressen.se
pixl97: Yea, devices like this are commonly built as cheap as possible, and using things like software component analysis typically doesn't happen. And while I can't say about this company, I've worked with other companies that contract/subcontract out building the software for devices like this to the point there is little to no internal software security culture at the parent company capable of identifying potential problems in said software. This is further exacerbated the the previously mentioned 'as cheaply as possible groups' quite often having poor control over their own employees and intentional hacks/data siphons being bundled with the device.I've seen larger firms that have come to own some software like this from buyouts and on the first analysis they'll find hundreds of shockingly easy exploits like RCE's in them.Along with this I've seen the number of software vulns reported by closed source software is no where close to what they find and fix silently at a huge number of companies.
ryandrake: Well, there are absolutely zero consequences to negligent companies, so it's no surprise they don't care. "The Market" never punishes companies for their terrible practices, and neither does any government. So we're stuck with crap written by bottom-of-the-barrel developers who don't care.
Lyrkan: Reminded me of this recent talk from 39C3 regarding another company (Xplora) that also sells smartwatches for children: https://www.youtube.com/watch?v=VRQz9EX2Tl0
hakonjdjohnsen: Agreed, that was a really good talk! It is kind of scary how simple some of these exploits that find their way into smartwatched for children are
GJim: Rather baffling the USA hasn't mandated cyber resilience for consumer products.
HiiDee: Is this just a problem with this specific brand, or is the whole industry this bad? I always assumed the bigger players had more to lose and would invest more in security.