• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
vulnerability in peloton bikes one example of a more widespread

Vulnerability in Peloton bikes one example of a more widespread security issue

You are here: Home / General Cyber Security News / Vulnerability in Peloton bikes one example of a more widespread security issue
June 16, 2021

Researchers on Tuesday discovered a flaw (CVE-2021-33887) in the Android Confirmed Boot (AVB) approach for the Peloton Bicycle+, leaving the procedure vulnerable. (Photograph by Ezra Shaw/Getty Pictures)

Scientists on Tuesday located a flaw (CVE-2021-33887) in the Android Verified Boot (AVB) process for the Peloton Bicycle+, leaving the system vulnerable.

In a site submit, McAfee scientists mentioned a worst-scenario scenario could take place when an attacker would boot the Peloton with a modified image to achieve elevated privileges and then leverage those privileges to establish a reverse shell, granting the attacker unfettered root access on the bike remotely. The hacker could then tamper with the product at any place from development to warehouse to shipping and delivery, installing a backdoor into the Android pill that will come with the bike with no the end user knowing. An attacker could also wander up to a Peloton bike set up in a gym and perform an attack, gaining root entry on these units for later on use.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


The McAfee investigation was substantial and of general interest because Peloton has been in the information for security issues. They experienced a tussle with the American Client Item Security Fee this spring. And there have been numerous stories when President Biden moved to the White House about the Key Company locking down the incoming President’s exercise tools since the Peloton tablets have crafted-in cameras and microphones.

Though topical because of all the higher-profile people who use Pelotons, Jack Mannino, CEO at nVisium, mentioned the AVB issue is not one of a kind to Peloton. Mannino reported several Android unit OEMs put up with from comparable flaws transported in generation units.

“Android presents abilities for Confirmed Boot, on the other hand, bootloader security configurations continue to need to be configured properly by the manufacturer,” Mannino reported.  “Otherwise, as was demonstrated, an attacker can acquire complete command of the bootloader and gadget.”

Ted Driggs, head of product at ExtraHop Head of Item, extra that the Peloton’s camera, microphone, and neighborhood network entry make it a especially desirable concentrate on for attackers.

“The bikes not only have the proper components to provide as a pivot level to obtain other gadgets linked to the residence network and from there, organization resources, it can also be utilised to covertly pay attention in on virtual conferences and other delicate business enterprise discussions that now get area from the residence office environment.”

Setu Kulkarni, vice president, approach at WhiteHat Security, said it’s easy to  brush this research off by expressing the situation of bypassing the AVB can’t be carried out devoid of physical obtain to the gadget. However, he said that is a error since the measures taken by the researchers can be easily replicated in other operational environments exactly where the foundation OS for a related device is Android-based mostly.

“What if this was on a related gadget in a healthcare facility?” posed Kulkarni. “The security researchers were being ready to affirm that there ended up several controls in spot, but not all permutations have been tested. A blend of luck, a handful of easily out there resources, and verbose logging was enough to root a very locked down system.”


Some parts of this report are sourced from:
www.scmagazine.com

Previous Post: «why backups are not the panacea for recovery from a Why backups are not the panacea for recovery from a ransomware attack
Next Post: Researchers Uncover ‘Process Ghosting’ — A New Malware Evasion Technique researchers uncover 'process ghosting' — a new malware evasion technique»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • New HTTPBot Botnet Launches 200+ Precision DDoS Attacks on Gaming and Tech Sectors
  • Top 10 Best Practices for Effective Data Protection
  • Researchers Expose New Intel CPU Flaws Enabling Memory Leaks and Spectre v2 Attacks
  • Fileless Remcos RAT Delivered via LNK Files and MSHTA in PowerShell-Based Attacks
  • [Webinar] From Code to Cloud to SOC: Learn a Smarter Way to Defend Modern Applications
  • Meta to Train AI on E.U. User Data From May 27 Without Consent; Noyb Threatens Lawsuit
  • Coinbase Agents Bribed, Data of ~1% Users Leaked; $20M Extortion Attempt Fails
  • Pen Testing for Compliance Only? It’s Time to Change Your Approach
  • 5 BCDR Essentials for Effective Ransomware Defense
  • Russia-Linked APT28 Exploited MDaemon Zero-Day to Hack Government Webmail Servers

Copyright © TheCyberSecurity.News, All Rights Reserved.