Belkin Patches Massive Smart Home Device Vulnerability

Many consumers are hesitant to invest in smart home technology for fear that their thermostats or lights might be hacked. As it turns out, their concern may have been justified: Security researchers recently uncovered several critical security flaws in Belkin's WeMo line of smart home devices that could have thrown homes into chaos.

IOActive, a Seattle-based security firm, announced the discovery yesterday (Feb. 18). According to a statement from IOActive, software flaws in WeMo devices could have allowed attackers to control the devices remotely, install their own malicious firmware, monitor conditions in a target's home or even access a target's computer network.

Belkin was also rather lax with its secure socket layer (SSL) Web-connection security protocols. When a WeMo device conferred with Belkin's central servers, Belkin did not properly validate its SSL certificates. This allowed anyone with an SSL certificate (an easy-to-acquire security protocol) to push phony firmware updates on unsuspecting users.

Without secure smart-home protocols, manufacturers will be dependent on traditional Wi-Fi architecture. Standard computer programs and mobile apps are only as secure as their programmers make them, and there is no such thing as an unhackable program — as WeMo demonstrated.

Most unsecure apps can reveal a user's email address or, at worst, credit card number. Although it's admittedly a very extreme case, an unsecure smart-home app could start a house fire. Expect smart-home security to evolve significantly over the next few years. 

TOPICS
Marshall Honorof

Marshall Honorof was a senior editor for Tom's Guide, overseeing the site's coverage of gaming hardware and software. He comes from a science writing background, having studied paleomammalogy, biological anthropology, and the history of science and technology. After hours, you can find him practicing taekwondo or doing deep dives on classic sci-fi.