Researchers Reveal Vulnerabilities of Telepresence Robot | Robotics

New research from Zingbox has detailed in telepresence that hackers could use to access sensitive data, including chat conversations, images, and live video streams.

Initially discussed at the RSA conference in April 2018, Zingbox said its researchers worked with manufacturers to discover five Common Vulnerabilities and Exposures (CVEs), which ranged from unprotected credentials to unauthorized remote access. The company said it is releasing the details of the vulnerabilities now that manufacturers have had a chance to address the issues.

“While much of the burden of ensuring device security falls on the healthcare providers, the collaboration between device manufacturers and security vendors is a critical component to assist healthcare providers,” said Daniel Regaldo, principal security researcher at Zingbox, and co-author of Gray Hat Hacking. “I commend the quick actions by the device manufacturers, which enable us to share additional details regarding this vulnerability and educate the industry on the latest cyber threats.”

Vulnerabilities fixed or in process of being patched

selected the VGo , nicknamed “Celia,” from Vecna Technologies, performing a vulnerability assessment “to try to gain unauthorized access and control of it,” the report stated.

The five vulnerabilities discovered, and reported to the manufacturer, included:

  • CVE-2018-8858: Insufficiently Protected Credentials – Wi-Fi, XMPP ( Pending)
  • CVE-2018-8860: Cleartext Transmission of Sensitive Information – Firmware (Patched in firmware version
  • CVE-2018-8866: Improper Neutralization of Special Elements – RCE (Patched in firmware version
  • CVE-2018-17931: Improper Access Control (USB) (Patch Pending)
  • CVE-2018-17933: Improper Authorization (XMPP Client) – (Patch Pending)

Regaldo said it was highly probable that other telepresence robots could have the same mistakes in implementation as the Vgo.

Also Read:  IoT Security and AI Ethics Among Topics to Be Featured at Annual IEEE Event

“It is hard to say if other robots would be affected by the same vulnerabilities without testing them,” he said. “However, the bugs identified in Vecna’s robot are related to common technology used across devices, meaning firmware , shell command injection, and USB Autorun.”

The report said there were several key lessons from the tests, including:

  • As with IT security, it is important to involve Internet of Things security from the design phase of product development.
  • IoT devices need physical interaction with humans by design, so physical security needs to be improved.
  • IoT manufacturers and security researchers need to start collaborating more closely. Bug bounty programs are the best approach in this regard.
  • Trigger real-time alerts so security teams can take actions immediately, and network devices can react accordingly.

Security around robotics remains a high concern for many – earlier this year, researchers revealed vulnerabilities in the Robot Operating System where hackers could take over popular service robots Pepper and NAO from SoftBank and install ransomware.

Zingbox is offering the full report here for a free download. Robotics Business Review has reached out to Vecna Technologies to get more details on the pending patch schedule, and we will update this story once we hear back.

You might also like More from author

Comments are closed.