Early Tuesday, Security firm IOActive issued a warning about multiple vulnerabilities in Belkin WeMo Home Automation devices that could give attackers the ability to remotely control WeMo Home Automation attached devices over the Internet, perform malicious firmware updates, and in some cases, remotely monitor the devices.
Belkin’s WeMo uses Wi-Fi and mobile Internet to enable users to control home electronics from any location in the world from their smartphone.
IOActive, claiming that Belkin had not issued any patches for the security flaws, issued its own advisory due to the fact that Belkin was unresponsive.
In its advisory issued on Feb 18., CERT warned: “We are currently unaware of a practical solution to this problem.”
A Belkin spokesperson originally responded to a SecurityWeek inquiry Tuesday afternoon saying, “Our security teams are looking into the vulnerabilities now.”
However, on Tuesday evening, many hours later, the same spokesperson told SecurityWeek the vulnerabilities were fixed before IOActive and CERT issued security advisories on Feb 18.
“We actually were in contact with [IOActive] before as we’ve had the fixes implemented already,” the spokesperson told SecurityWeek late Tuesday. “It seems like a case of miscommunication between various parties.”
“Belkin has corrected the list of five potential vulnerabilities affecting the WeMo line of home automation solutions that was published in a CERT advisory on February 18,” the company said in a statement issued late Tuesday.
“Belkin was in contact with the security researchers prior to the publication of the advisory, and, as of February 18, had already issued fixes for each of the noted potential vulnerabilities via in-app notifications and updates.”
Belkin said users with the most recent firmware release (version 3949) are not at risk for malicious firmware attacks or remote control or monitoring of WeMo devices from unauthorized devices.
According to Belkin, specific fixes that have been issued include:
• An update to the WeMo API server on November 5, 2013 that prevents an XML injection attack from gaining access to other WeMo devices.
• An update to the WeMo firmware, published on January 24, 2014, that adds SSL encryption and validation to the WeMo firmware distribution feed, eliminates storage of the signing key on the device, and password protects the serial port interface to prevent a malicious firmware attack
• An update to the WeMo app for both iOS (published on January 24, 2014) and Android (published on February 10, 2014) that contains the most recent firmware update
Belkin advised users to download the latest mobile apps from the App Store (version 1.4.1) or Google Play (version 1.2.1) and then upgrade the firmware version through the app.
If Belkin had actually made the fixes, it either did not push them out to users effectively or did an incredibly poor job communicating that fixes were available to the outside world.
This story will be updated with any additional comments from IOActive and Belkin.

For more than 10 years, Mike Lennon has been closely monitoring the threat landscape and analyzing trends in the National Security and enterprise cybersecurity space. In his role at SecurityWeek, he oversees the editorial direction of the publication and is the Director of several leading security industry conferences around the world.
More from Mike Lennon
- Watch Now: Threat Detection and Incident Response Virtual Summit
- Registration Now Open: 2023 ICS Cybersecurity Conference | Atlanta
- NetRise Adds $8 Million in Funding to Grow XIoT Security Platform
- Virtual Event Today: Zero Trust Strategies Summit
- Virtual Event Tomorrow: Zero Trust Strategies Summit
- Watch: How to Build Resilience Against Emerging Cyber Threats
- Video: How to Build Resilience Against Emerging Cyber Threats
- Webinar Today: Understanding Hidden Third-Party Identity Access Risks
Latest News
- Android’s June 2023 Security Update Patches Exploited Arm GPU Vulnerability
- BBC, British Airways, Novia Scotia Among First Big-Name Victims in Global Supply-Chain Hack
- Sysdig Introduces CNAPP With Realtime CDR
- Stay Focused on What’s Important
- VMware Plugs Critical Flaws in Network Monitoring Product
- Google Patches Third Chrome Zero-Day of 2023
- Hackers Issue ‘Ultimatum’ Over Payroll Data Breach
- US, Israel Provide Guidance on Securing Remote Access Software
