Now on Demand Ransomware Resilience & Recovery Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Belkin: Security Fixes Were Already Issued for Recent WeMo Vulnerabilities

Early Tuesday, Security firm IOActive issued a warning about multiple vulnerabilities in Belkin WeMo Home Automation devices that could give attackers the ability to remotely control WeMo Home Automation attached devices over the Internet, perform malicious firmware updates,

Early Tuesday, Security firm IOActive issued a warning about multiple vulnerabilities in Belkin WeMo Home Automation devices that could give attackers the ability to remotely control WeMo Home Automation attached devices over the Internet, perform malicious firmware updates, and in some cases, remotely monitor the devices.

Belkin’s WeMo uses Wi-Fi and mobile Internet to enable users to control home electronics from any location in the world from their smartphone.

IOActive, claiming that Belkin had not issued any patches for the security flaws, issued its own advisory due to the fact that Belkin was unresponsive.

In its advisory issued on Feb 18., CERT warned: “We are currently unaware of a practical solution to this problem.”

A Belkin spokesperson originally responded to a SecurityWeek inquiry Tuesday afternoon saying, “Our security teams are looking into the vulnerabilities now.”

However, on Tuesday evening, many hours later, the same spokesperson told SecurityWeek the vulnerabilities were fixed before IOActive and CERT issued security advisories on Feb 18.

“We actually were in contact with [IOActive] before as we’ve had the fixes implemented already,” the spokesperson told SecurityWeek late Tuesday. “It seems like a case of miscommunication between various parties.”

“Belkin has corrected the list of five potential vulnerabilities affecting the WeMo line of home automation solutions that was published in a CERT advisory on February 18,” the company said in a statement issued late Tuesday.

Advertisement. Scroll to continue reading.

“Belkin was in contact with the security researchers prior to the publication of the advisory, and, as of February 18, had already issued fixes for each of the noted potential vulnerabilities via in-app notifications and updates.”

Belkin said users with the most recent firmware release (version 3949) are not at risk for malicious firmware attacks or remote control or monitoring of WeMo devices from unauthorized devices.

According to Belkin, specific fixes that have been issued include:

• An update to the WeMo API server on November 5, 2013 that prevents an XML injection attack from gaining access to other WeMo devices.

• An update to the WeMo firmware, published on January 24, 2014, that adds SSL encryption and validation to the WeMo firmware distribution feed, eliminates storage of the signing key on the device, and password protects the serial port interface to prevent a malicious firmware attack

• An update to the WeMo app for both iOS (published on January 24, 2014) and Android (published on February 10, 2014) that contains the most recent firmware update

Belkin advised users to download the latest mobile apps from the App Store (version 1.4.1) or Google Play (version 1.2.1) and then upgrade the firmware version through the app.

If Belkin had actually made the fixes, it either did not push them out to users effectively or did an incredibly poor job communicating that fixes were available to the outside world.

This story will be updated with any additional comments from IOActive and Belkin.

Written By

For more than 15 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

MSSP Dataprise has appointed Nima Khamooshi as Vice President of Cybersecurity.

Backup and recovery firm Keepit has hired Kim Larsen as CISO.

Professional services company Slalom has appointed Christopher Burger as its first CISO.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.

IoT Security

A vulnerability affecting Dahua cameras and video recorders can be exploited by threat actors to modify a device’s system time.