Incident: ThroughTek Kalay SDK Vulnerability Exposes Millions of IoT Devices

Published Date: 2021-08-17

Postmortem Analysis
Timeline 1. The software failure incident involving the vulnerability in the ThroughTek Kalay SDK was discovered by researchers from the security firm Mandiant at the end of 2020 [117823]. Therefore, the software failure incident happened in late 2020.
System 1. ThroughTek Kalay SDK 2. ThroughTek P2P products 3. Kalay version 3.1.10 4. Kalay SDK version 3.1.5 5. Encrypted communication protocol DTLS 6. API authentication mechanism AuthKey 7. Devices lacking OTA function
Responsible Organization 1. The vulnerability in smart devices, including security cameras, DVRs, and baby monitors, was caused by a critical bug in the ThroughTek Kalay software development kit (SDK) [117823].
Impacted Organization 1. Users of smart devices such as security cameras, DVRs, and baby monitors were impacted by the software failure incident [117823].
Software Causes 1. The software failure incident was caused by a critical bug in the ThroughTek Kalay software development kit (SDK) that allowed attackers to access live video and audio streams, take full control of smart devices remotely, and potentially view sensitive information or perform remote code execution [117823].
Non-software Causes 1. Lack of customer awareness and prioritization of software updates [117823] 2. Inadequate information provided by the software developer regarding the critical nature of updates [117823] 3. Resistance from customers to enable certain protective features due to concerns about connection speed [117823]
Impacts 1. The vulnerability in the ThroughTek Kalay SDK allowed attackers to access live video and audio streams from smart devices, take full control remotely, and potentially view sensitive security footage or peek inside a baby's crib [117823]. 2. Attackers could exploit the flaw to perform remote code execution, launch denial of service attacks, or install malicious firmware on target devices [117823]. 3. The flaw in the registration mechanism between devices and their mobile applications allowed attackers to hijack connections by obtaining a device's UID and special credentials, leading to unauthorized access to sensitive information [117823]. 4. Despite efforts to mitigate the vulnerability by ThroughTek and Mandiant, it was challenging to get customers to update their devices en masse, leaving a significant population of devices still vulnerable [117823].
Preventions 1. Ensuring devices are running Kalay version 3.1.10 or higher, originally released by ThroughTek in late 2018, or implementing the optional Kalay features like the encrypted communication protocol DTLS and the API authentication mechanism AuthKey [117823]. 2. Mandiant researchers recommending customers to upgrade their SDK and enable the protective features [117823]. 3. Increasing awareness among manufacturers and users about the critical nature of software updates and security features to prevent exploitation [117823].
Fixes 1. Devices need to be running Kalay version 3.1.10 or higher, and manufacturers must turn on two optional Kalay features: the encrypted communication protocol DTLS and the API authentication mechanism AuthKey [117823].
References 1. Security firm Mandiant [117823] 2. Department of Homeland Security's Cybersecurity and Infrastructure Security Agency [117823] 3. ThroughTek [117823] 4. Researchers from Nazomi Networks [117823]

Software Taxonomy of Faults

Category Option Rationale
Recurring one_organization, multiple_organization (a) The software failure incident has happened again at one_organization: - The vulnerability in the ThroughTek Kalay SDK, which allows attackers to access live video and audio streams from smart devices, has been reported by researchers from Mandiant and the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency [117823]. - ThroughTek, the company behind the Kalay platform, has been struggling to get customers to update their devices to mitigate the vulnerability, even though the necessary fixes have been available for several years [117823]. (b) The software failure incident has happened again at multiple_organization: - Researchers from Nazomi Networks recently disclosed a different vulnerability in the Kalay platform that could also be exploited to access live audio and video feeds [117823]. - There have been warnings for years about the security implications of prefab IoT platforms like Kalay, indicating that similar vulnerabilities may exist in other similar platforms used by different organizations [117823].
Phase (Design/Operation) design, operation (a) The software failure incident related to the design phase is evident in the vulnerability discovered in the ThroughTek Kalay SDK. The critical bug was found in the registration mechanism between devices and their mobile applications, specifically revolving around each device's unique Kalay identifier (UID). This flaw allowed attackers to hijack the connection by reregistering the UID, leading to unauthorized access to sensitive information and remote control of devices [117823]. (b) The software failure incident related to the operation phase is highlighted by the difficulty in getting customers to update their devices en masse. Despite the availability of a fix in the form of turning on two optional Kalay features, encrypted communication protocol DTLS, and API authentication mechanism AuthKey, many customers hesitated to upgrade due to concerns about connection speed. This operational challenge contributed to the persistence of the vulnerability in a significant number of devices even after three years of the initial alert [117823].
Boundary (Internal/External) within_system, outside_system (a) The software failure incident related to the vulnerability in the ThroughTek Kalay SDK can be categorized as within_system. The critical bug was discovered within the registration mechanism between devices and their mobile applications, specifically related to the unique Kalay identifier (UID) and the protocol used by Kalay. This flaw allowed attackers to hijack connections and gain unauthorized access to sensitive information and control over the devices [117823]. (b) The software failure incident can also be categorized as outside_system as the vulnerability stemmed from the software development kit (ThroughTek Kalay) that is integrated into various smart devices manufactured by different companies. The flaw was not limited to a single manufacturer but affected a wide range of devices using the Kalay platform, highlighting the external nature of the vulnerability that permeated over 83 million devices and a billion internet connections each month [117823].
Nature (Human/Non-human) non-human_actions, human_actions (a) The software failure incident in this case is primarily due to non-human actions, specifically a critical vulnerability in the ThroughTek Kalay software development kit (SDK) that allows attackers to access live video and audio streams, take control of devices remotely, and potentially exploit sensitive information without human involvement [117823]. The vulnerability lies in the registration mechanism between devices and their mobile applications, allowing attackers to hijack connections and manipulate devices through the Kalay platform [117823]. (b) However, human actions also play a role in exacerbating the situation. For instance, the failure to update devices with the necessary security patches and enable protective features like encrypted communication protocol DTLS and API authentication mechanism AuthKey contributes to the persistence of the vulnerability [117823]. Additionally, the delayed response from manufacturers and customers in updating the SDK and implementing necessary security measures highlights the human factor in addressing and mitigating the software failure incident [117823].
Dimension (Hardware/Software) software (a) The software failure incident reported in the article is primarily related to software vulnerabilities in the ThroughTek Kalay SDK, which is used in various smart devices such as security cameras, DVRs, and baby monitors. The vulnerability allows attackers to access live video and audio streams, take control of the devices remotely, and potentially exploit sensitive information or perform remote code execution [117823]. (b) The software failure incident is specifically attributed to a critical bug in the registration mechanism between devices and their mobile applications, which is a software-related issue. The flaw in the UID registration process allows attackers to hijack connections, obtain special credentials, and control devices remotely without the user's knowledge. The vulnerability is in the software development kit (SDK) provided by ThroughTek, highlighting a software-related failure [117823].
Objective (Malicious/Non-malicious) malicious (a) The software failure incident described in the article is malicious in nature. The vulnerability in the ThroughTek Kalay SDK could allow an attacker to access live video and audio streams, take full control of smart devices remotely, retrieve sensitive information, perform remote code execution, and potentially install malicious firmware on target devices [117823]. The flaw in the registration mechanism between devices and their mobile applications can be exploited by attackers to hijack connections and gain unauthorized access to devices, demonstrating malicious intent to harm the system.
Intent (Poor/Accidental Decisions) accidental_decisions (a) The intent of the software failure incident was not due to poor decisions but rather due to mistakes or unintended decisions. The vulnerability in the ThroughTek Kalay SDK that led to the software failure incident was discovered by researchers from the security firm Mandiant, who then disclosed it in conjunction with the Department of Homeland Security's Cybersecurity and Infrastructure Security Agency [117823]. The incident was not a result of poor decisions but rather a critical bug in the registration mechanism between devices and their mobile applications, which allowed attackers to exploit the flaw and gain unauthorized access to sensitive information and control over the devices remotely.
Capability (Incompetence/Accidental) development_incompetence (a) The software failure incident in the article is related to development incompetence. The vulnerability in the ThroughTek Kalay SDK, affecting millions of smart devices, was discovered by researchers from the security firm Mandiant. They found a critical bug in the registration mechanism between devices and their mobile applications, allowing an attacker to hijack the connection and take full control of the gadgets remotely [117823]. (b) The software failure incident can also be attributed to accidental factors. The vulnerability in the ThroughTek Kalay SDK was not intentionally created but was a result of a flaw in the registration mechanism that could be exploited by attackers. The company, ThroughTek, acknowledged the vulnerability and worked with Mandiant to address the issue by recommending manufacturers to enable two optional Kalay features to mitigate the risk [117823].
Duration permanent (a) The software failure incident described in the article is more of a permanent nature. The vulnerability in the ThroughTek Kalay SDK, which allows attackers to access live video and audio streams, take full control of devices remotely, and potentially exploit sensitive information, is a critical flaw that persists until the necessary security measures are implemented [117823]. Despite the availability of updates and optional features to mitigate the vulnerability, the challenge lies in getting all affected devices to apply these fixes, leading to a prolonged period of exposure to potential attacks.
Behaviour omission, value, other (a) crash: The software failure incident described in the article does not involve a crash where the system loses state and does not perform any of its intended functions. (b) omission: The vulnerability in the software allows an attacker to access live video and audio streams over the internet and take full control of the gadgets remotely. This can be considered an omission failure as the system omits to protect the devices from unauthorized access [117823]. (c) timing: The software failure incident is not related to timing issues where the system performs its intended functions but at the wrong time. (d) value: The vulnerability in the software allows attackers to control the devices remotely, access sensitive information, view video feeds in real-time, potentially install malicious firmware, and perform denial of service attacks. This can be considered a value failure as the system performs its intended functions incorrectly by allowing unauthorized access and control [117823]. (e) byzantine: The software failure incident does not involve a byzantine failure where the system behaves erroneously with inconsistent responses and interactions. (f) other: The other behavior observed in this software failure incident is the exploitation of a critical bug in the software development kit that allows attackers to hijack connections, access sensitive information, and control devices remotely without the user's knowledge [117823].

IoT System Layer

Layer Option Rationale
Perception sensor, network_communication, embedded_software (a) sensor: The software failure incident reported in the article is related to a vulnerability in smart devices, including security cameras, DVRs, and baby monitors, that could allow an attacker to access live video and audio streams over the internet and take control of the gadgets remotely. This vulnerability is due to a flaw in the registration mechanism between devices and their mobile applications, specifically related to the unique Kalay identifier (UID) used by the devices [117823]. (b) actuator: The article does not specifically mention any failure related to actuator errors. (c) processing_unit: The software failure incident is not directly attributed to errors in the processing unit. (d) network_communication: The vulnerability in the smart devices, allowing unauthorized access and control, is related to flaws in the network communication between the devices and their corresponding mobile apps. Attackers can exploit this vulnerability to remotely manage embedded devices like IP cameras [117823]. (e) embedded_software: The software failure incident is primarily related to a critical bug in the software development kit (SDK) called ThroughTek Kalay, which is embedded in smart devices to facilitate connections with mobile apps. The flaw in the registration mechanism and the lack of proper authentication mechanisms in the embedded software contribute to the vulnerability that allows attackers to take control of the devices remotely [117823].
Communication connectivity_level The software failure incident described in the article [117823] is related to the communication layer of the cyber physical system that failed at the connectivity_level. The vulnerability in the ThroughTek Kalay software development kit (SDK) allowed attackers to access live video and audio streams, take control of devices remotely, and manipulate various functionalities without the user's knowledge. The flaw was in the registration mechanism between devices and their mobile applications, allowing attackers to hijack connections and exploit the devices remotely through the Kalay platform. To mitigate this vulnerability, manufacturers were advised to enable two optional Kalay features: the encrypted communication protocol DTLS and the API authentication mechanism AuthKey. Despite efforts to address the issue, it was challenging to get customers to update en masse, leading to a large population of vulnerable devices still in use.
Application TRUE The software failure incident described in the article [117823] is related to the application layer of the cyber physical system. The vulnerability in the ThroughTek Kalay SDK allowed attackers to access live video and audio streams, take control of devices remotely, trigger firmware updates, change camera angles, and perform other actions without the user's knowledge. This failure was due to a critical bug in the registration mechanism between devices and their mobile applications, allowing attackers to hijack connections and exploit the devices. The flaw required knowledge of the Kalay protocol and the device's UID, enabling unauthorized access and control of the devices through the application layer of the system.

Other Details

Category Option Rationale
Consequence harm, property, non-human, theoretical_consequence The consequence of the software failure incident discussed in the article is primarily related to the potential harm and property impact caused by the vulnerability in the ThroughTek Kalay software development kit. The vulnerability could allow attackers to access sensitive information, such as camera feeds, and perform remote code execution, potentially leading to physical harm or unauthorized access to personal data [117823]. The article also mentions the possibility of attackers remotely controlling devices, viewing sensitive security footage, peeking inside a baby's crib, launching denial of service attacks, and installing malicious firmware on target devices [117823]. Additionally, the article highlights the difficulty in getting customers to update their devices to mitigate the vulnerability, indicating a potential property impact as users may be unable to protect their devices effectively [117823].
Domain information, other (a) The software failure incident reported in the article is related to the information industry. The vulnerability in the ThroughTek Kalay SDK impacted smart devices such as security cameras, DVRs, and baby monitors, which are used for the production and distribution of information through live video and audio streams over the internet [Article 117823]. (m) The software failure incident is also related to the "other" industry, as it involves the Internet of Things (IoT) security meltdown caused by the vulnerability in the ThroughTek Kalay SDK, which is used in various smart devices [Article 117823].

Sources

Back to List