HP study finds smartwatches susceptible to attack

HP recently unveiled results of a report confirming that smartwatches with network and communication functionality represent a new and open frontier for cyber attack. As part of an ongoing series looking at Internet of Things (IoT) security, the study conducted by HP Fortify found that 100% of the tested smartwatches contain significant vulnerabilities. These include inadequate authentication, lack of encryption and privacy concerns. In the report HP outlines actionable recommendations for secure smartwatch development and use, both at home and in the workplace.

Results pertinent as smartwatch market continues to grow

As the IoT market progresses, the convenience and capabilities of smartwatches will result in growing popularity. As they become more mainstream, smartwatches will increasingly store more sensitive information such as health data, and through connectivity with mobile apps may soon enable physical access functions including unlocking cars and homes.

“Smartwatches have only just started to become a part of our lives, but they deliver a new level of functionality that could potentially open the door to new threats to sensitive information and activities,” said Jason Schmitt, General Manager, HP Security, Fortify. “As the adoption of smartwatches accelerates, the platform will become vastly more attractive to those who would abuse that access, making it critical that we take precautions when transmitting personal data or connecting smartwatches into corporate networks.”

 

Are smartwatches designed to store and protect the sensitive data?

Leveraging the HP Fortify on Demand to assess 10 smartwatches, along with their Android and iOS cloud and mobile application components, the HP study questioned whether smartwatches are designed to store and protect the sensitive data and tasks for which they are built. The team uncovered numerous security concerns.

The most common and easily addressable security issues reported include:

1. Insufficient user authentication/authorisation: Every smartwatch tested was paired with a mobile interface that lacked two-factor authentication and the ability to lock out accounts after 3 – 5 failed password attempts. Some 30%, were vulnerable to account harvesting, meaning an attacker could gain access to the device and data via a combination of weak password policy, lack of account lockout, and user enumeration.

2. Lack of transport encryption: Transport encryption is critical given that personal information is being moved to multiple locations in the cloud. While 100% of the test products implemented transport encryption using SSL/TLS, 40% of the cloud connections continue to be vulnerable to the POODLE attack, allow the use of weak cyphers, or still used SSL v2.

3. Insecure interfaces: 30% of the tested smartwatches used cloud-based web interfaces, all of which exhibited account enumeration concerns. In a separate test, 30% also exhibited account enumeration concerns with their mobile applications. This vulnerability enables hackers to identify valid user accounts through feedback received from reset password mechanisms.

4. Insecure software/firmware: A full 70% of the smartwatches were found to have concerns with protection of firmware updates, including transmitting firmware updates without encryption and without encrypting the update files. However, many updates were signed to help prevent the installation of contaminated firmware. While malicious updates cannot be installed, lack of encryption allows the files to be downloaded and analysed.

5. Privacy concerns: All smartwatches collected some form of personal information, such as name, address, date of birth, weight, gender, heart rate and other health information. Given the account enumeration issues and use of weak passwords on some products, exposure of this personal information is a concern.

Consumers urged to consider security

Consumers are advised to consider security when choosing to use a smartwatch while manufacturers work to incorporate necessary security measures. It’s suggested that users do not enable sensitive access control functions such as car or home access unless strong authorisation is offered. In addition, enabling passcode functionality, ensuring strong passwords and instituting two-factor authentication will help prevent unauthorised access to data. These security measures are not only important to protecting personal data, but are critical as smartwatches are introduced to the workplace and connected to corporate networks. Additional guidelines for secure smartwatch use are outlined in the full report.

Methodology

Conducted by HP Fortify, the HP Smartwatch Security Study used the HP Fortify on Demand IoT testing methodology that combined manual testing along with the use of automated tools. Devices and their components were assessed based on the OWASP Internet of Things Top 10 and the specific vulnerabilities associated with each top 10 category.

All data and percentages for this study were drawn from the 10 smartwatches tested during this study. While there are certainly a fair number of smartwatch devices already on the market, and that number continues to grow, HP believes the similarity in results of the 10 smartwatches provides a good indicator of the current security posture of smartwatch devices.

More
articles