Trustwave flushes out Android app-enabled toilet hack risk

Security researchers claims hackers could use app to remotely control toilet's functions.

Security researchers have discovered a vulnerability in an app used to control a luxury toilet that allows hackers to take control of the lavatory's functions.

The flaw was discovered by security firm Trustwave in the Inax's Satis automatic toilet, which uses an Android app to controls the cistern's functions via Bluetooth.

Advertisement - Article continues below

The "My Satis" Android application has a hard-coded Bluetooth PIN of "0000". The firm warned users the flaw could allow hackers to use the "My Satis" app to control any Satis smart toilet.

"An attacker could simply download the 'My Satis' application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner," said Trustwave's researchers in a security advisory.

"Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user," researchers warned.

Trustwave has made three attempts to contact the vendor about the vulnerability since the middle of June, and has warned users that no patch from the manufacturer has been issued. There are currently no known workarounds as researchers have nothing from the vendor to go on.

The security vendor has also flagged a vulnerability in a talking rabbit toy. Karotz, which is a Wi-Fi enabled device in the shape of a rabbit, can be controlled by hackers and video its surroundings.

Advertisement
Advertisement - Article continues below
Advertisement - Article continues below

The rabbit can be controlled using an API at api.karotz.com over plaintext HTTP, meaning the session token used to authenticate API calls can be stolen by an attacker sitting on the same network. 

"The session token can be used to perform any remote API call available to the application. For instance, if the application uses the webcam, a video could be captured using the webcam and sent to an arbitrary server," said Trustwave's researchers.

Featured Resources

The case for a marketing content hub

Transform your digital marketing to deliver customer expectations

Download now

Fast, flexible and compliant e-signatures for global businesses

Be at the forefront of digital transformation with electronic signatures

Download now

Why CEOS should care about the move to SAP S/4HANA

And how they can accelerate business value

Download now

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network

Download now
Advertisement

Recommended

Visit/mobile/mobile-security/355889/parachute-introduces-superlock-feature
mobile security

Parachute's Superlock feature keeps your phone recording in an emergency

2 Jun 2020
Visit/security/encryption/355820/k2view-innovates-in-data-management-with-new-encryption-patent
encryption

K2View innovates in data management with new encryption patent

28 May 2020
Visit/software/video-conferencing/355410/zoom-50-adds-256-bit-encryption-and-ui-refresh
video conferencing

Zoom 5.0 adds 256-bit encryption to address security concerns

23 Apr 2020
Visit/security/hacking/355382/whatsapps-flaw-shoulder-surfing
hacking

WhatsApp flaw leaves users open to 'shoulder surfing' attacks

21 Apr 2020

Most Popular

Visit/security/ransomware/355891/nasa-it-contractor-ransomware-hack
ransomware

Ransomware collective claims to have hacked NASA IT contractor

3 Jun 2020
Visit/security/exploits/355866/critical-vmware-cloud-director-exploit-lets-hackers-seize-corporate
exploits

VMware Cloud Director exploit lets hackers seize corporate servers

2 Jun 2020
Visit/data-insights/data-science/355678/how-data-science-is-transforming-business
Sponsored

How data science is transforming business

29 May 2020