Belkin fixes WEMO security vulnerabilities

Earlier today security services company IOActive released a statement detailing potential vulnerabilities it had discovered in the popular Belkin Wemo range of remote or smart home switches.  Belkin has this evening responded to the reports with news of updates and patches that fix what it describes as potential vulnerabilities.

Belkin WEMO Switch

iOActive’s claims are complex and rather technical, however any potential unauthorised control of the Wemo switches or more worrying the sensors or cameras should be of concern to owners and users.

The IOActive release said “Mike Davis, IOActive’s principal research scientist, uncovered multiple vulnerabilities in the WeMo product set that gives attackers the ability to:

  • Remotely control WeMo Home Automation attached devices over the Internet
  • Perform malicious firmware updates
  • Remotely monitor the devices (in some cases)
  • Access an internal home network

Now personally, the worst thing that could happen to me is that some geek turns on my bedroom light while I’m sleeping, however with many people using the Belkin Wemo cameras and other sensors there is a justified concern for these remote systems.

Belkin today responded to several twitter conversations I was having with concerned users with a link to a statement outlining how the vulnerabilities had been fixed.  That statement is here and I’ve reproduced it below.  Belkin Wemo users should check this and ensure their app and device firmware is up to date.

Security vulnerabilities published in CERT advisory fixed

Belkin has corrected the list of five potential vulnerabilities affecting the WeMo line of home automation solutions that was published in a CERT advisory on February 18. Belkin was in contact with the security researchers prior to the publication of the advisory, and, as of February 18, had already issued fixes for each of the noted potential vulnerabilities via in-app notifications and updates. Users with the most recent firmware release (version 3949) are not at risk from these malicious firmware attacks or remote control or monitoring of WeMo devices from unauthorized devices. Belkin urges such users to download the latest app from the App Store (version 1.4.1) or Google Play Store (version 1.2.1) and then upgrade the firmware version through the app. Specific fixes Belkin has issued include:

1) An update to the WeMo API server on November 5, 2013 that prevents an XML injection attack from gaining access to other WeMo devices. 

2) An update to the WeMo firmware, published on January 24, 2014, that adds SSL encryption and validation to the WeMo firmware distribution feed, eliminates storage of the signing key on the device, and password protects the serial port interface to prevent a malicious firmware attack 

3) An update to the WeMo app for both iOS (published on January 24, 2014) and Android (published on February 10, 2014) that enables the most recent firmware update

Recent Posts

  • Lifestyle

LG wins numerous honours at IFA’s inaugural Innovation Awards

LG have won a staggering 17 awards at the inaugural Innovation Awards at IFA 2025…

11 hours ago
  • Lifestyle

Keeping you and your supplies cool this summer thanks to EcoFlow

There’s camping, there’s glamping but EcoFlow takes the great outdoors to a whole new level…

14 hours ago
  • Tech

I’m heading to Apple HQ for their iPhone event – here’s what I’m expecting

I've touched down in San Francisco after a flight from Berlin for the biggest event…

18 hours ago
  • Tech

Lenovo shows of new Legion Go gaming handheld and new AI powered devices

Lenovo has unveiled their latest suite of AI-Powered Devices and Experiences at IFA, with new…

19 hours ago
  • Tech

ACER unveils new Nitro and Predator gaming devices at IFA

It’s not just home appliances being announced at Europe’s largest consumer electronics show, with ACER…

20 hours ago
  • Motoring

Podcast: EV Batteries after-life – a real solution – Two Blokes Talking Electric Cars

This week we talk to an EV owner worried about range who went and got…

20 hours ago