Samsung SmartThings vulnerability lets hackers make their own house keys

A newly-discovered security flaw in Samsung’s SmartThings hub is proving that even the biggest smart home systems aren’t hack-proof.

Researchers at the University of Michigan, in conjunction with Microsoft Research, have discovered a vulnerability in the SmartThings platform that allows hackers to effectively create their own keys for a connected door lock. A separate issue with app privileges would also allow an attacker to remotely control devices on the SmartThings network, and possibly steal the PIN for a home’s door locks, Wired reports.

The biggest issue relates to how third-party smart home control apps implement the authorization protocol OAuth. Although SmartThings issues guidelines on how these apps are supposed to work, all it took was one non-complaint app to open up a flaw in the SmartThings web server. The attackers were then able to create a link to Samsung’s actual SmartThings login page, but with the secret ability to steal the user’s login tokens. With those tokens in hand, an attacker could create their own PIN for a home’s door locks, unbeknownst to the user.

In practice, a spoofed email claiming to be from SmartThings would be enough to fool users into surrendering their login tokens and granting access to their homes.

The researchers also described a separate problem with apps that ask for too much control over a user’s smart home. As a proof-of-concept, the researchers created an app that claimed to only monitor the battery level of various devices, but in fact was able to set off smoke detectors, disable “vacation mode,” and steal the PIN to the user’s door locks. Users who don’t pay close attention to an app’s permission requests would be vulnerable.

What is Samsung doing about all this? The company told The Verge that it is updating its documentation for developers to prevent bad implementations of OAuth, but it’s unclear if the underlying flaw will be fixed. As for the prospect of malicious apps, Samsung says it is adding new security review requirements, though the researchers claim they could bypass inspection by injecting malicious commands from their servers after approval. In other words, these vulnerabilities are being mitigated, but not fixed outright.

This isn’t the first instance of security flaws in the SmartThings platform. Last December, researchers discovered a flaw in the underlying ZigBee networking protocol that would let attackers jam communications on the network during a break-in, thereby preventing security alarms from triggering. Samsung issued a fix for users a few months later.

Why this matters: SmartThings is hardly alone in having vulnerabilities in its smart home platform, as research has shown problems on a wide range of other devices. While users can take some precautions on their own, it’s unlikely that any system will be completely free of security flaws. Users will need to weigh the convenience of these products against the security risks—especially for products that provide access to the home or its vital functions—and consider multiple layers of security to prevent an attack.

IDG Insider


« LG shows off a fingerprint reader that integrates into your phone's front glass


EMC World kicks off with cloud backup and cheaper flash arrays »
IDG News Service

The IDG News Service is the world's leading daily source of global IT news, commentary and editorial resources. The News Service distributes content to IDG's more than 300 IT publications in more than 60 countries.

  • Mail


Do you think your smartphone is making you a workaholic?