📺IOT

OWASP IOT TOP 10 - 2018

1. Weak, Guessable or Harcoded Passwords

Check IOT default password

Use of :

  • Easily bruteforced

  • Publicly available

  • Unchangeable credentials

Including backdoors in firmware or client software that grants unauthorized access.

2. Insecure Network Services

Unneeded or insecure network services running on the device itself, especially:

  • Those exposed to the Internet

  • Any that compromise the confidentiality, integrity/authenticity, or availability of information

  • Any service that allows unauthorized remote control

3. Insecure Ecosystem Interfaces

See OWASP TOP 10, insecure interfaces in the ecosystem outside the device :

  • Web

  • Backend API

  • Cloud

  • Mobile

Common issues :

  • Lack of authentication

  • Lack of authorization

  • Lacking or weak encryption

  • Lack of input and output filtering

4. Lack of Secure Update Mechanism

Lack of ability to securely update the device.

  • Lack of firmware validation on device

  • Lack of secure delivery (un-encrypted in transit)

  • Lack of anti-rollback mechanisms

  • Lack of notifications of security changes due to updates

5. Use of Insecure or Outdated Components

Use of deprecated or insecure software components/libraries that could allow the device to be compromised.

  • Insecure customization of operating system platforms

  • Third-party software libraries from a compromised supply chain

  • Third-party hardware components from a compromised supply chain

Examples : HeartBleed, Spectre, Meltdown

6. Insufficient Privacy Protection

User’s personal information stored on the device or in the ecosystem that is used insecurely, improperly, or without permission.

Examples : location, emails, addresses.

7. Insecure Data Transfer and Storage

Lack of encryption or access control of sensitive data anywhere within the ecosystem, including at rest, in transit, or during processing.

Examples : lack of HSTS, no disk encryption

8. Lack of Device Management

Examples : no update mechanism, no logging.

9. Insecure Default Settings

Bad filesystem permissions

Exposed services running as root

10. Lack of Physical Hardening

Easily Available Debug Port Discovery

Last updated

Was this helpful?