Security Alerts blog

Critical Bug Hacking into IoT Devices

Security experts are sending out a high alert on a critical vulnerability that heavily affected tons of devices used worldwide that are connected to the ThroughTek’s Kalay IoT cloud platform.

The Impact

The vulnerability impacts products from different companies that produce reconnaissance and video solutions that include home computerised IoT frameworks, which utilise the Kalay network for easy access to communication and connection through a corresponding application.

A remote threat actor could use this vulnerability to hack into live sound, video transfers and take over your device.

Followed as CVE-2021-28372, the issue is a gadget pantomime weakness – with a severe score of 9.6 out of 10. It influences the Kalay convention that is carried out as a software development kit (SDK) which is built into work-related applications.

The remediation

In a security warning made on 20 July 2021 for another critical weakness in its SDK (CVE-2021-32934), and with an update on 13 August 2021, ThroughTek advises users to do the following – to relieve the dangers related with CVE-2021-28372:

  • If utilising ThroughTek SDK v3.1.10 or more, empower DTLS (Datagram Transport Layer Security) and AuthKey to ensure the information in transit is protected.
  • If utilising the older versions of ThroughTek SDK released before v3.1.10, upgrade your library to v3.3.1.0 or v3.4.2.0 and turn on both DTLS and AuthKey.

Additionally, Mandiant suggests the services that return Kalay UIDs or the security controls on the APIs should be analysed.

Source: Bleeping Computer

Risk Crew

Share
Published by
Risk Crew

Recent Posts

ISO 42001: Key Insights You Need to Know

Introducing ISO 42001 – the world’s first international management system standard focused specifically on AI.…

2 months ago

ISO 27001 Requirements | Your Roadmap to Compliance

Data breaches and cyberattacks have become daily concerns for information security professionals and business leaders.…

2 months ago

How to Get Ready for a Penetration Test

It is an undeniable fact that all applications and infrastructures are essentially in need of…

4 months ago