Vulnerability CVE-2013-4866


Published: 2015-04-16   Modified: 2015-04-17

Description:
The LIXIL Corporation My SATIS Genius Toilet application for Android has a hardcoded Bluetooth PIN, which allows physically proximate attackers to trigger physical resource consumption (water or heat) or user discomfort.

See advisories in our WLB2 database:
Topic
Author
Date
High
LIXIL Satis Toilet Hard-Coded Bluetooth PIN
Daniel Crowley
02.08.2013

Type:

CWE-259

(Use of Hard-coded Password)

CVSS2 => (AV:A/AC:L/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
3.3/10
2.9/10
6.5/10
Exploit range
Attack complexity
Authentication
Adjacent network
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Lixil -> My satis genius toilet 

 References:
https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt
http://www.independent.co.uk/life-style/gadgets-and-tech/features/now-even-toilets-arent-safe-from-hacking-8747232.html
http://www.huffingtonpost.co.uk/2013/08/05/smart-toilet-could-attackmy-satis_n_3706116.html
http://seclists.org/fulldisclosure/2013/Aug/18
http://packetstormsecurity.com/files/122655/LIXIL-Satis-Toilet-Hard-Coded-Bluetooth-PIN.html
http://arstechnica.com/security/2013/08/holy-sht-smart-toilet-hack-attack/

Copyright 2024, cxsecurity.com

 

Back to Top