Severe Vulnerability in ThroughTek SDK Exposes Millions of IoT Devices to Potential Attacks
On August 18, 2021, a significant security flaw was identified within multiple versions of the ThroughTek Kalay P2P Software Development Kit (SDK). This vulnerability, designated as CVE-2021-28372 with a CVSS score of 9.6, poses a serious risk by potentially enabling remote attackers to gain control over affected devices, potentially leading to remote code execution.
This weakness, discovered by FireEye Mandiant in late 2020, relates specifically to improper access control within ThroughTek’s point-to-point (P2P) products. Experts warn that successful exploitation of this vulnerability could allow attackers to listen in on live audio feeds, view real-time video streams, and compromise device credentials, setting the stage for additional, more severe attacks leveraging the exposed functionalities of these devices. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has highlighted that this could result in unauthorized access to sensitive information, significantly raising the stakes for businesses utilizing these devices.
Currently, it is estimated that around 83 million active devices are operational on the Kalay platform. This large number underscores a widespread potential impact, which may affect a broad array of sectors employing IoT technology, from home security systems to medical devices. The vulnerability’s nature means that both individual consumers and organizations are at risk.
In terms of adversary tactics as defined by the MITRE ATT&CK framework, initial access methods likely exploited the vulnerability. Attackers could gain persistence by establishing a foothold through compromised devices. Furthermore, the attack could facilitate privilege escalation, allowing the intruder broader control over the device once access is gained.
Organizations using ThroughTek products should take immediate action to address this vulnerability by updating their systems and implementing stringent security measures to fortify their defenses. As the threat landscape evolves, it is crucial for business owners to remain vigilant and informed about such vulnerabilities that threaten the integration and operation of Internet of Things (IoT) solutions in their operations.
The implications of such vulnerabilities extend beyond individual devices; they affect the overall security posture of the organizations employing them. As IoT continues to proliferate, the cybersecurity community must remain proactive in identifying and addressing these critical vulnerabilities to minimize the risk of exploitation and safeguard sensitive data.