klotz: cybersecurity* + iot*

0 bookmark(s) - Sort by: Date ↓ / Title / - Bookmarks from other users for this tag

  1. Security researcher BobDaHacker discovered multiple critical vulnerabilities in the Petlibro smart pet feeder system. The most severe is an **authentication bypass** allowing attackers to log in to *any* account using publicly available Google IDs. Petlibro acknowledged the issues and offered a $500 bounty, but has left the vulnerable login endpoint active for "legacy compatibility" over two months after initial reporting, despite promising a fix.

    Other vulnerabilities included:

    * Viewing details of any pet by ID.
    * Obtaining serial numbers and MAC addresses.
    * Manipulating feeding schedules, camera feeds, and settings without authentication.
    * Retrieving mealtime messages recorded by owners.
    * Gaining access to devices by adding oneself as a shared owner.
  2. Brother printers (and printers from Fujifilm, Ricoh, Toshiba, and Konica Minolta) are affected by multiple vulnerabilities discovered by Rapid7, including a critical, unpatchable flaw (CVE-2024-51978) allowing attackers to generate default admin passwords if they know the device's serial number. While seven of the eight vulnerabilities have been patched, the critical one requires a manufacturing process change by Brother. The primary mitigation is to change the default administrator password.
  3. US crosswalk buttons were hijacked to play AI-generated voices of prominent figures like Bezos, Musk, and Zuckerberg. The hack exploited a default password (1234) on Polara's Field Service app, which allowed unauthorized configuration of the crosswalk signals.

Top of the page

First / Previous / Next / Last / Page 1 of 0 SemanticScuttle - klotz.me: Tags: cybersecurity + iot

About - Propulsed by SemanticScuttle