Find out why this can be a huge cybersecurity risk
Find out why this can be a huge cybersecurity risk
In today’s digital age, consumers are increasingly recognizing the convenience and benefits afforded by Internet of Things (IoT) products. These connected devices offer a wide array of smart features that make everyday life easier and better. Looking to the future, the outlook on the global consumer IoT market is forecast to reach $204.8 billion by 2027, rising at a market growth of 15.9% CAGR from 2021 to 2027.
But as their popularity grows, there is an increasing need to better secure these connected devices from potential cyber threats. To that, recent developments such as the launch of the ETSI EN 303 645 cybersecurity standard for consumer IoT devices is a step in the right direction.
In this article, we look at the first section of the ETSI EN 303 645 cybersecurity standard, which is ‘No universal default passwords’, and examine why having default passwords is a bad idea for consumer IoT products.
The first line of defense to protect consumer IoT devices is through authentication, the process or action of verifying the identity of a user or process.
To grant access to a device, identification (such as a username) is used, and authentication is needed so users can prove their identity. Authentication can be based on:
The danger lies in using weak passwords, highlighting the necessity of using no universal default passwords. Every device has attack surfaces, which include all the software and hardware interfaces an unauthorized user can exploit to gain access or to retrieve data from the device.
A typical vulnerability is posed by the usage of a weak password. Characteristics of weak passwords include the following:
To mitigate weak passwords, one scheme that can be used as a reference is FIPS 140-2 which recommends for a password the following criteria:
Universal default password happens when the same password is used on all devices of a model when they are in operational state.
Manufacturers using a universal default password for a device creates weak vulnerabilities which can be exploited by hackers. Let’s illustrate that with the following scenario. Mr. Smith buys a smart refrigerator called SuperFridge which, when connected, can be accessed through an APP (through the Internet) with a default username “SuperFridge” and default password “000000”. Mr. Smith is not tech savvy and finds his new smart fridge convenient since when he runs out of milk, he has set the settings of the smart fridge via the APP so that the smart fridge automatically orders a bottle of milk from the local food store.
Mr. Mallory, meanwhile, is a malicious hacker. He buys the same fridge model to study its flaws and finds out quickly that the device is using a default username and password. Which means he can connect to any of these smart fridges and send malicious messages:
Another way is through ‘brute force’. This type of attack involves ‘guessing’ credentials (usually username and passwords - but it can also be a token if they are short length) to gain unauthorized access to a system.
When a password is used by default on a device, it should be unique for each device and its generation method should not be easily guessed.
Using the example of Mr. Smith and the SuperFridge, creating a password this way: “SuperFridge” + factory batch number = SuperFridge462” would be too easy to guess. A generation mechanism should produce a password that appears random like “f2wd34hsd2aead89”.
When a user is sending its username and password over a network, he/she needs to ensure that if a malicious hacker is “listening” on the network that data he is sending (since the data is the credentials) and that he is not able to read it.
To avoid sending cleartext credential, the user will send its credential on a secure communication channel. A common method is to use TLS 1.2 (or 1.3) over http to provide data encryption.
A brute force attack involves ‘guessing’ credential (usually username and passwords- but it can also be token if they are short length) to gain unauthorized access to a system.
The image below shows an attacker using the tool Hydra to brute force some credential by trying different passwords:
In the image above, the password was guessed with only 85 attempts but the hacker can send millions of requests to try to guess credentials. To avoid these millions of attempts, devices can prevent brute forcing attacks with:
Mirai botnet made the headlines of newspaper in 2016 by creating an internet outage in the US West Coast with a distributed denial of service. It was a botnet of millions of IoT device which an attacker add control ovet. To get control of all these IoT devices, infected devices are scanning the internet to find other devices. If a targeted device respond to the prob, the malware will try to log into them by brute forcing authentication using a list of 60 default passwords (such as: 1111, 6666, password, admin, guest) and usernames (mainly root, admin). To have a grasp on how widespread default passwords are, one can take a look at publicly available database of default password: https://many-passwords.github.io/
To address cybersecurity concerns in consumer IoT devices, the ETSI EN 303 645 cybersecurity standard was launched to provide a comprehensive set of directives for device manufacturers - and the industry at large - to strengthen cybersecurity for these devices. The standard also serves as a basis for certifications of future IoT products.
Containing 13 provisions, it is a globally applicable cybersecurity guide for consumer IoT devices covering security needs of equipment, communications and personal data protection. The first directive on the list covers the use - or rather misuse - of weak default passwords.
The first provision stated in the ETSI EN 303 645 cybersecurity standard is that no universal default passwords should be used. According to this standard, the following shall apply for consumer IoT product passwords:
From a reading of the provision, we can see that it rules out using passwords that can be easily guessed or hacked by brute force, while also calling for ways to allow users to change authentication passwords.
Consumers are increasingly paying attention to cybersecurity for their consumer IoT devices. Device manufacturers can provide great confidence and reassurance to consumers when making purchases by certifying their products under the ETSI EN 303 645 standard. One way to do so for manufacturers is by working with organizations such as TÜV SÜD for their ETSI EN 303 645 testing and Attestation of Conformance (AoC). TÜV SÜD experts are intimately familiar with the cyber fraud and data privacy regulations in specific markets and a deep understanding of the cyber threat field, working with customers around the world to fully unlock the potential of the digital future. Cybersecurity and data protection are one of our core capabilities. From product design, manufacturing to operations, we provide you with intimate support at every step to reduce the cybersecurity and data privacy disclosure risk.
Learn more about our ETSI EN 303 645 testing services here.
Discover how TÜV SÜD's cybersecurity services can help IoT device manufacturers
Learn More
Helps IoT device manufacturers develop products based on international cybersecurity standards
Learn More
Find out what the ETSI EN 303 645 standard is and why it’s important for consumer IoT products and devices.
Learn More
Learn about how TÜV SÜD ensured that iRobot’s product complied with the IoT cybersecurity standard ETSI 303 645
Learn More
Site Selector
Global
Americas
Asia
Europe
Middle East and Africa