Trustwave flushes out Android app-enabled toilet hack risk

Security researchers claims hackers could use app to remotely control toilet's functions.

Security researchers have discovered a vulnerability in an app used to control a luxury toilet that allows hackers to take control of the lavatory's functions.

The flaw was discovered by security firm Trustwave in the Inax's Satis automatic toilet, which uses an Android app to controls the cistern's functions via Bluetooth.

The "My Satis" Android application has a hard-coded Bluetooth PIN of "0000". The firm warned users the flaw could allow hackers to use the "My Satis" app to control any Satis smart toilet.

"An attacker could simply download the 'My Satis' application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner," said Trustwave's researchers in a security advisory.

"Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user," researchers warned.

Trustwave has made three attempts to contact the vendor about the vulnerability since the middle of June, and has warned users that no patch from the manufacturer has been issued. There are currently no known workarounds as researchers have nothing from the vendor to go on.

The security vendor has also flagged a vulnerability in a talking rabbit toy. Karotz, which is a Wi-Fi enabled device in the shape of a rabbit, can be controlled by hackers and video its surroundings.

The rabbit can be controlled using an API at api.karotz.com over plaintext HTTP, meaning the session token used to authenticate API calls can be stolen by an attacker sitting on the same network. 

"The session token can be used to perform any remote API call available to the application. For instance, if the application uses the webcam, a video could be captured using the webcam and sent to an arbitrary server," said Trustwave's researchers.

Featured Resources

Unlocking collaboration: Making software work better together

How to improve collaboration and agility with the right tech

Download now

Four steps to field service excellence

How to thrive in the experience economy

Download now

Six things a developer should know about Postgres

Why enterprises are choosing PostgreSQL

Download now

The path to CX excellence for B2B services

The four stages to thrive in the experience economy

Download now

Recommended

How to encrypt files and folders in Windows 10
encryption

How to encrypt files and folders in Windows 10

9 Apr 2021
The definitive guide to IT security
Whitepaper

The definitive guide to IT security

9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack
ransomware

Evidence suggests REvil behind Harris Federation ransomware attack

9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories
5G

Fujitsu taps Trend Micro to secure private 5G networks in smart factories

8 Apr 2021

Most Popular

Microsoft is submerging servers in boiling liquid to prevent Teams outages
data centres

Microsoft is submerging servers in boiling liquid to prevent Teams outages

7 Apr 2021
Hackers are using fake messages to break into WhatsApp accounts
instant messaging (IM)

Hackers are using fake messages to break into WhatsApp accounts

8 Apr 2021
How to find RAM speed, size and type
Laptops

How to find RAM speed, size and type

8 Apr 2021