Recurring |
one_organization |
(a) The software failure incident related to the Snoo Smart Bassinet has happened again within the same organization, the Happiest Baby Company. The article mentions that the Red Balloon researchers found and disclosed additional remotely exploitable vulnerabilities in Snoo's software that could be used to mount the same attacks. The Happiest Baby Company patched the software vulnerabilities in less than two weeks after being notified by the researchers [98218].
(b) The software failure incident related to the Snoo Smart Bassinet has not been reported to have happened at other organizations or with their products and services. |
Phase (Design/Operation) |
design, operation |
(a) The software failure incident related to the design phase can be seen in the case of the Snoo Smart Bassinet. Researchers from the embedded-device security firm Red Balloon discovered authentication and infrastructure issues in the Snoo's software that would have allowed an attacker on the same Wi-Fi network to take total control of the device [98218]. These vulnerabilities were related to the design of the software and its interaction with the hardware components of the bassinet, highlighting the importance of getting security right in the development phase of connected devices.
(b) The software failure incident related to the operation phase is evident in the potential risks posed by leaving the Wi-Fi enabled on the Snoo bassinet. Red Balloon researchers found that with Wi-Fi enabled, users could be exposed to software vulnerabilities that could be exploited remotely if an attacker compromised the Wi-Fi network [98218]. This highlights the importance of proper operation and maintenance procedures, such as disabling unnecessary features like Wi-Fi when not needed, to mitigate the risks associated with software vulnerabilities in operational settings. |
Boundary (Internal/External) |
within_system |
(a) The software failure incident related to the Snoo Smart Bassinet can be categorized as within_system. The vulnerabilities discovered by the researchers from Red Balloon were related to authentication and infrastructure issues within the Snoo's software that allowed attackers on the same Wi-Fi network to take total control of the device [98218]. Additionally, the researchers found software vulnerabilities that could be exploited to mount remote attacks on the Snoo, indicating that the failures originated from within the system itself. |
Nature (Human/Non-human) |
non-human_actions, human_actions |
(a) The software failure incident occurring due to non-human actions:
The software failure incident with the Snoo Smart Bassinet was primarily due to software flaws and potential attacks exploiting them, which were discovered by researchers from the embedded-device security firm Red Balloon [98218]. These vulnerabilities allowed an attacker on the same Wi-Fi network as the bassinet to take total control of the device without physical access, enabling them to send commands to the motor, speaker, and microphones remotely. Additionally, the researchers found hardware choices in the Snoo devices that were problematic, such as the motor's output limiter and the lack of a physical limiter for controlling the speaker's volume maximums [98218].
(b) The software failure incident occurring due to human actions:
The vulnerabilities in the Snoo Smart Bassinet were discovered and disclosed by researchers from Red Balloon, who identified authentication and infrastructure issues in the software that could be exploited by attackers on the same Wi-Fi network as the bassinet [98218]. The Happiest Baby Company, the maker of the Snoo, patched the software vulnerabilities after being notified by the researchers. The researchers also found additional remotely exploitable vulnerabilities in the software, which were later patched by the company [98218]. |
Dimension (Hardware/Software) |
hardware, software |
(a) The software failure incident related to hardware in the Snoo Smart Bassinet involved two problematic hardware choices that were not as easy to patch or fix. One issue was with the Snoo motor's output limiter, which despite having protections built in, could still be manipulated remotely to generate more force than intended [98218].
(b) The software failure incident related to software in the Snoo Smart Bassinet included authentication and infrastructure issues that allowed an attacker on the same Wi-Fi network to take total control of the device. These vulnerabilities were patched, but additional remotely exploitable vulnerabilities in the software were later found and disclosed by researchers [98218]. |
Objective (Malicious/Non-malicious) |
malicious, non-malicious |
(a) The software failure incident related to the Snoo Smart Bassinet involved malicious factors introduced by humans with the intent to harm the system. Researchers from the embedded-device security firm Red Balloon discovered authentication and infrastructure issues in the Snoo's software that would have allowed an attacker on the same Wi-Fi network to take total control of the device, including sending commands to the motor, speaker, and microphones [98218]. The researchers were able to exploit these vulnerabilities to remotely manipulate the bassinet's motor, driving it faster and generating more force than intended, as demonstrated in their lab testing with a life-sized doll [98218]. Additionally, the researchers found remotely exploitable vulnerabilities in the Snoo's software that could be used to mount attacks, which were disclosed to the Happiest Baby Company and subsequently patched [98218].
(b) The software failure incident also involved non-malicious factors, as the vulnerabilities discovered by Red Balloon were not initially reported to have caused any real-world harm to infants using the Snoo. The Happiest Baby Company emphasized that the built-in hardware limiters in the Snoo prevented the bed's calming sensations from exceeding safe levels, and the sounds and rocking produced by the researchers would not be loud or vigorous enough to harm a baby [98218]. Despite the vulnerabilities identified, the company stated that no one had ever reported a hack or breach of a Snoo, and the risk of real-world exploitation or injury was considered low [98218]. |
Intent (Poor/Accidental Decisions) |
poor_decisions, accidental_decisions |
(a) The software failure incident related to the Snoo Smart Bassinet involved poor decisions made in the design and implementation of the software. Researchers from Red Balloon discovered authentication and infrastructure issues in the software that could allow an attacker on the same Wi-Fi network to take total control of the device, including sending commands to the motor, speaker, and microphones [98218]. Additionally, the researchers found problematic hardware choices in the Snoo devices that were not easy to patch or fix, such as the motor's output limiter and the lack of a physical limiter for the speaker volume [98218].
(b) The software failure incident also involved accidental decisions or unintended consequences. Despite the Happiest Baby Company's assertion that the sounds and rocking produced by the researchers would not be loud or vigorous enough to harm a baby, the vulnerabilities identified by Red Balloon could potentially lead to unintended effects on the device, such as exceeding safe sound levels or generating excessive rocking force [98218]. |
Capability (Incompetence/Accidental) |
development_incompetence |
(a) The software failure incident in the Snoo Smart Bassinet was primarily due to development incompetence. Researchers from the embedded-device security firm Red Balloon discovered authentication and infrastructure issues in the Snoo's software that allowed an attacker on the same Wi-Fi network to take total control of the device [98218]. These vulnerabilities were patched after being reported to the Happiest Baby Company. Additionally, the researchers found hardware choices in the Snoo devices that were problematic and not easy to patch, such as the motor's output limiter and the lack of a physical volume limiter for the speaker [98218].
(b) The software failure incident was not accidental but rather a result of deliberate exploitation of vulnerabilities by the researchers from Red Balloon. They conducted tests to manipulate the Snoo's motor remotely and exceed the intended operating volume of the speaker by sending specially crafted commands to the device [98218]. The vulnerabilities were identified through intentional research efforts to uncover security flaws in the smart bassinet's software and hardware. |
Duration |
temporary |
The software failure incident related to the Snoo Smart Bassinet can be categorized as a temporary failure. The incident involved software flaws and potential attacks exploiting them, which were discovered by researchers from Red Balloon [98218]. These vulnerabilities were subsequently patched by the Happiest Baby Company after being disclosed by the researchers. The vulnerabilities allowed an attacker on the same Wi-Fi network as the bassinet to take total control of the device, sending commands to the motor, speaker, and microphones remotely. The vulnerabilities were addressed through software patches and additional checks on the firmware side to ensure the safety of the device [98218]. |
Behaviour |
omission, value, other |
(a) crash: The software failure incident related to the Snoo Smart Bassinet involved potential attacks exploiting software flaws that could have allowed an attacker on the same Wi-Fi network as the bassinet to take total control of the device, including sending commands to the motor, speaker, and microphones [98218].
(b) omission: The software vulnerabilities discovered in the Snoo Smart Bassinet could have allowed attackers to remotely manipulate the device's motor, speaker, and microphones without physical access, potentially omitting the intended functions of the bassinet's safety features [98218].
(c) timing: The software vulnerabilities in the Snoo Smart Bassinet did not directly relate to timing issues, as the primary concern was the potential for attackers to take control of the device remotely rather than the timing of its functions [98218].
(d) value: The software vulnerabilities in the Snoo Smart Bassinet could have led to the system performing its intended functions incorrectly, such as manipulating the motor to generate more force than intended or playing sounds at higher decibel levels than designed [98218].
(e) byzantine: The software vulnerabilities in the Snoo Smart Bassinet did not exhibit byzantine behavior, as the focus was on potential attacks exploiting the flaws rather than inconsistent responses or interactions within the system [98218].
(f) other: The software vulnerabilities in the Snoo Smart Bassinet led to concerns about potential attacks exploiting the flaws, including remotely manipulating the device's motor and speaker, playing sounds at higher decibel levels, and taking total control of the bassinet [98218]. |