Home security systems, such as video cameras and motion detectors, have gained popularity as they join the growing Internet of Things (IoT) market and for boosting users' convenience. However, owners of Internet-connected home security systems may not be the only ones monitoring their homes, according to a security testing study by HP.
The study found that all of the studied devices used in home security contain significant vulnerabilities, including password security, encryption and authentication issues. This reveals how ill-equipped the market is from a security standpoint for the magnitude of growth around IoT.
Manufacturers are quickly bringing to market connected security systems that deliver remote monitoring capabilities. The network connectivity and access necessary for remote monitoring presents new security concerns that did not exist for the previous generation of systems that have no Internet connectivity.
The HP study also questions whether connected security devices actually make our homes safer, or put them at more risk by providing easier electronic access via insecure IoT products.
HP leveraged HP Fortify on Demand to assess 10 home security IoT devices, along with their cloud and mobile application components, uncovering that none of the systems required the use of a strong password. In addition, all of the systems failed to offer two-factor authentication.
The most common and easily addressable security issues reported include:
- Insufficient authorisation - All systems that included their cloud-based web interfaces and mobile interfaces failed to require passwords of sufficient complexity and length with most only requiring a six character alphanumeric password. All systems also lacked the ability to lock out accounts after a certain number of failed attempts.
- Insecure interfaces - All cloud-based web interfaces tested exhibited security concerns enabling a potential attacker to gain account access through account harvesting, which uses three application flaws - account enumeration, weak password policy and lack of account lockout. Similarly, five of the 10 systems tested exhibited account harvesting concerns with their mobile application interface exposing consumers to similar risks.
- Privacy concerns - All systems collected some form of personal information such as name, address, date of birth, phone number and even credit card numbers. Exposure of this personal information is of concern given the account harvesting issues across all systems. It is also worth noting that the use of video is a key feature of many home security systems with viewing available via mobile applications and cloud-based web interfaces. The privacy of video images from inside the home becomes an added concern.
- Lack of transport encryption - While all systems implemented transport encryption such as SSL/TLS, many of the cloud connections remain vulnerable to attacks (e.g. POODLE attack). The importance of properly configured transport encryption is especially important since security is a primary function of these systems.
Sign up for CIO Asia eNewsletters.