Return to forums
Register new account
Login:

Mclaren Power Forums: August Smart Lock Pro Connect Security Flaw Leaks Your Wi-Fi Credentials To Hackers - Mclaren Power Forums

Jump to content

Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic

August Smart Lock Pro Connect Security Flaw Leaks Your Wi-Fi Credentials To Hackers

#1
User is offline   xysoom 

  • Advanced Member
  • PipPipPip
  • Group: Members
  • Posts: 5,970
  • Joined: 21-May 20
August Smart Lock Pro Connect Security Flaw Leaks Your Wi-Fi Credentials To Hackers



It appears that smart devices manufacturer August has a problem on its hands with its Smart Lock Pro + Connect, which is an app-enabled lock for residential homeowners. The Smart Lock Pro + Connect has been around since 2017, and is one of August’s most popular smart home products. So, any cracks in the security of the lock could leave millions of customers vulnerable to hackers, which is just what has been discovered thanks to a new investigation.To get more news about wifi security lock, you can visit securamsys.com official website.
The folks at Bitdefender in conjunction with PCMag found a weakness in security during the setup process for the lock. During initial setup, the Smart Lock Pro + Connect acts in effect like an access point, and gains access to your wireless network using your smartphone (via the August app) as a gateway. You enter your login credentials through your smartphone, which are then passed on to the Smart Lock Pro + Connect.While this setup process is simple enough for the end-user, the passing of your Wi-Fi credentials from your smartphone to the lock are not encrypted, which could leave them vulnerable to a snooping hacker lying in wait to infiltrate your network. However, the window of opportunity for leveraging this type of attack is incredibly small, as a homeowner (or renter) would typically only perform this setup one time. As a result, the attacker would need to be there at the precise moment that setup would occur, which would be a near impossibility.
However, Bitfender found that it’s possible to perform a separate attack that would force the Smart Lock Pro + Connect off your network, which would then require it to go through the setup process again. “The hacker would have to find a spot close enough to listen in on the Wi-Fi network, perhaps a parked car,” writes PCMag. “The attack that forces the doorbell offline takes time. And the device doesn’t reconnect until its owner notices that it's offline and initiates the exchange.”
If this attack vector sound similar, because nearly the exact same exploit was publicly acknowledged in Ring Video Doorbells back in November. Those smart devices were similarly sharing Wi-Fi credentials in cleartext during the setup process. Amazon worked with Bitdefender in that case to identify the cause and implement a solution, which involved encrypting the “handshake” between the smartphone and the doorbell during setup.

It’s worth noting that the last statement is factually incorrect, as witnessed by the above-mentioned method of knocking the Smart Lock Pro + Connect offline, thereby requiring setup to be restarted is a lingering problem. We should also provide full disclosure that the exploit only works with the Android version of the August app, meaning that iOS devices aren’t affected. In addition, while this hack could provider attackers with access to your entire home network, it does not allow them to control the operation of the actual locking and unlocking of your doors.
0

Share this topic:


Page 1 of 1
  • You cannot start a new topic
  • You cannot reply to this topic

1 User(s) are reading this topic
0 members, 1 guests, 0 anonymous users