Big-in-Japan 'bot offers root access through hard-coded password and worse bugs too Softbank's popular anthropomorphi
Big-in-Japan ‘bot offers root access through hard-coded password and worse bugs too
Softbank’s popular anthropomorphic robot, Pepper, has myriad security holes according to research published by Scandinavian researchers earlier this month.
The ‘bot allows unauthenticated root-level access, runs a Meltdown/Spectre-vulnerable processor, can be administered over unencrypted HTTP and has a default root password.
The researchers, Ãrebro University’s Alberto Giaretta working with Michele De Donno and Nicola Drgoni of the Technical University of Sweden, decided that while there have been various one-off stunt-hacks of the robot, they weren’t aware of any systematic assessment of Pepper’s security.
Their research found that âit is a breeze to remotely turn it into a ‘cyber and physical weapon’, exposing malicious behavioursâ.
A sorry list of vulns
The Meltdown/Spectre vulnerability was trivially identified, since all they needed was the
uname -a terminal command.
Smart robots prove stupidly easy to hack for spying and murder
A bit of Ettercap and Wireshark work revealed that the admin page is unsecured, which leaves naked the user/password pair of the only user account offered, called
The robot almost implemented some kind of security by limiting SSH access to
nao rather than permitting root SSH access, but since the root account’s password is
root (unchangeable and documented in the user manual), a superuser command from
nao's terminal gives the attacker full privileges.
There’s also no âlog offâ function in the admin panel.
âAs a side note, we strongly believe that, in 2018, selling products so easily vulnerable to these kinds of attacks is not tolerable anymoreâ, the researchers observed.
The researchers also found the bot is susceptible to a brute-force attack.
This would most likely succeed, because Softbank’s engineers haven’t provided any protections against an attacker hammering Pepper with unlimited password attempts: âno countermeasures to brute-force attacks have been deployed with Pepper, which is once again an intolerable and disappointing findingâ.
The researchers’ next victim was an application on Pepper called ‘Simple Animated Messages’ (SAM), which lets users âdesign a simple choreography that makes Pepper move, say something through a text-to-speech service, and show a picture on its on-board tabletâ.
By now you can guess what’s coming: âthe application performs no control over the file extension. As a matter of fact, we were able to upload images, text files which extensions have been modified to images, and even plain text files without performing extension editingâ.
They decided not to build a proof-of-concept, but believe this would be easy for an attacker to exploit.
Then there’s the Pepper API, which exposes its capabilities through languages like Python, C++, and Java, provides access to all sensors, cameras, microphones, and moving parts, and is âastonishingly insecureâ.
âPepper exposes a service on port 9559 which accepts TCP messages and reacts accordingly. As long as the messages comply to the API, by-design, Pepper accepts packets from whoever sends themâ â and without authentication.
An attacker able to communicate with Pepper over TCP could use the cameras and microphones to spy on people and conversations; could remotely interact with people (for example, to trick them into providing personal information); use Pepper as an attack robot; or send the shutdown or factory reset commands.
At least Furby dolls needed hardware hacks to make them swear. Â®