Year after being blasted for dodgy security, GPS kid tracker biz takes heat again for leaving families’ private info lying around for crims

0
27
Year after being blasted for dodgy security, GPS kid tracker biz takes heat again for leaving families' private info lying around for crims

Year after being blasted for dodgy safety, GPS kid tracker biz takes heat again for leaving households’ private info lying around for crims

A producer of child-tracking smartwatches was once beneath hearth this week following the invention of a 2nd primary safety lapse in its generation in as a few years.

Back in overdue 2017, Gator-branded wearables had been amongst more than a few kid-monitoring gizmos raked over the coals through Norwegian researchers who discovered the gadgets had been trivial to remotely hijack. These units are necessarily cellular-connected smartwatches children put on in order that folks can watch over their offspring from afar, monitoring their whereabouts, listening in on integrated microphones, and contacting them.

Fast ahead kind of a 12 months, and Brit infosec outfit Pen Test Partners determined to check out the protection of those units to look if defenses were shored up. The crew discovered that the internet portal utilized by households to observe their tykes’ Gator watches had a lovely dangerous exploitable computer virus.

Logged-in folks may just specify in a user-controlled parameter their get admission to degree, letting them improve their accounts to administrator degree. That might be exploited through stalkers, crims and different miscreants to listen in on as many 30,000 shoppers, download their touch main points, and establish and monitor the site of kids.

“This means that an attacker could get full access to all account information and all watch information,” defined Pen Test Partners’ Vangelis Stykas previous this week.

“They could view any user of the system and any device on the system, including its location. They could manipulate everything and even change users’ emails/passwords to lock them out of their watch.”

He defined: “The Gator web backend was passing the user level as a parameter. Changing that value to another number gave super admin access throughout the platform. The system failed to validate that the user had the appropriate permission to take admin control.”

gif;base64,R0lGODlhAQABAAAAACH5BAEKAAEALAAAAAABAAEAAAICTAEAOw== - Year after being blasted for dodgy security, GPS kid tracker biz takes heat again for leaving families' private info lying around for crims

Up to 3 million youngsters’ GPS watches may also be tracked through folks… and any miscreant: Flaws spill pick-and-choose catalog for perverts

READ MORE

The attacker would additionally be capable to trade the e-mail and passwords on a given watch to fasten sufferers out of gadgets. The researcher famous that different child-monitoring watch manufacturers most probably proportion the similar internet backend as Gator, which means different gizmos would even be vulnerable to the similar assault.

While TechSixtyFour – which owns the Gator emblem and constructed the inclined internet portal – patched the flaw a couple of days after Pen Test Partners reported the programming cock-up in January, Stykas was once crucial of the biz and what he described as a “train wreck” state of affairs.

Pen Test Partners alerted UK-based TechSixtyFour on January 11, and gave them a month to mend it because of the wide-open nature of the outlet. TechSixtyFour requested for two months, however the request was once denied. At first, the producer attempted to handle the vulnerability and wound up blocking off the researchers’ accounts with HTTP 502 mistakes, in keeping with Stykas. In the top, it was once patched through January 16.

TechSixtyFour founder Colleen Wong defended her corporate’s dealing with of safety problems, noting that the gizmo maker maintains a complete vulnerability disclosure coverage, and because 2017 has passed through every year penetration assessments.

“We appreciate Ken Munro of Pen Test Partners disclosing this vulnerability to us, and our team have taken this seriously as our fix was completed within 48 hours. An internal investigation of the logs did not show that anybody had exploited this flaw for malicious purposes,” Wong mentioned in a remark to The Register on Friday.

She added that TechSixtyFour’s engineers “implemented a partial fix within 12 hours. They then identified the root cause and deployed a full fix within 48 hours of the notification.”

TechSixtyFour isn’t by myself in catching heat for its shoddy GPS watch safety. In November of ultimate 12 months, Pen Test Partners came upon more than one distributors had been the usage of insecure transmission strategies, and Stykas does not be expecting any of the smartwatch makers to reinforce any time quickly.

“On a wider scale the GPS watch market needs to ensure that their products are adequately tested. The problem is that the price point of these devices is so low that there is little available revenue to cover the cost of security,” Stykas mentioned.

“Our advice is to avoid watches with this sort of functionality like the plague. They don’t decrease your risk, they actively increase it.” ®

LEAVE A REPLY

Please enter your comment!
Please enter your name here