Meanwhile, the SOHOpelessly Broken 2.0 study has been released by Independent Security Evaluators. The picture it paints of routers and the so-called 'smart' devices that make up the rapidly expanding Internet of Things (IoT) is not pretty.
Accordingly, the researchers sum up their findings as follows:
"Today, we show that security controls put in place by device manufacturers are insufficient against attacks carried out by remote adversaries. This research project aimed to uncover and leverage new techniques to circumvent these new security controls in embedded devices."
Thus, the research team investigated several SOHO routers and NAS devices offered by a range of manufacturers, including:
- Asustor (a subsidiary of ASUS)
Sadly, devices from every manufacturer listed above had at least one web app vulnerability that could allow a remote attacker to gain access to the administrative panel of the device in question. Even more, the researchers reported that they were able to obtain root shells on 12 of the devices, giving them complete control. Consequently, in six cases, they were able to gain complete control remotely and without authentication.
The most at-risk routers the group tested are the:
- Asustor AS-602T
- Buffalo TeraStation TS5600D1206
- TerraMaster F2-420
- Drobo 5N2
- Netgear Nighthawk R9000
- TOTOLINK (Zioncom) A3002RU
Since the publication of the SOHOpelessly Broken 1.0 report, the research team did say that the general state of security on IoT devices had improved somewhat. While things have no doubt improved, there are still miles to go before IoT security could be called anything approaching robust.
As a result, many of the IoT devices sold today lack basic web application features like browser security headers and anti-CSRF tokens. However, until these issues are addressed, the conclusions fronted by the SOHOpelessly Broken 3.0 report won't be much better than they are now.