Friday, January 24, 2025
Homecyber securityAndroid Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

Android Kiosk Tablets Vulnerability Let Attackers Control AC & Lights

Published on

SIEM as a Service

Follow Us on Google News

A security flaw found in Android-based kiosk tablets at luxury hotels has exposed a grave vulnerability, potentially allowing attackers to control air conditioning, lighting, and other room functions remotely.

The investigation, highlighted by security researchers at LAC Co., Ltd., reveals how these vulnerabilities could compromise guest privacy and hotel security.

These devices, now commonplace in upscale hotels, offer convenience, controlling amenities like AC, lighting, and room service orders.

A vulnerable tablet installed in the guest room
A vulnerable tablet installed in the guest room

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Vulnerabilities in Android Kiosk Mode Tablets

  1. USB Debugging Exploitation
    The researchers discovered that USB debugging was activated on the tablet under certain conditions. By rebooting the device and quickly connecting it via USB, they bypassed security settings to enable debugging and accessing sensitive device data. This could allow attackers to install malicious applications or even eavesdrop through cameras and microphones.
The dialog box that appears when the USB debugging setting is on. It doesn't appear when the kiosk app is running...
The dialog box that appears when the USB debugging setting is on. It doesn’t appear when the kiosk app is running…
  1. Temporary Settings Change on Reboot
    Between the time the Android operating system launched and the kiosk app loaded, attackers could access system settings, turn on debugging, or configure other critical options.
Swipe the notification area to open the Settings app immediately after booting the OS
Swipe the notification area to open the Settings app immediately after booting the OS
  1. Safe Mode Exploit
    By booting the tablet in Safe Mode, the restrictive kiosk app was disabled, exposing the home screen and allowing attackers to freely navigate the device, modify settings, and exploit its features.
An attacker to perform any screen operation or change settings on the device
An attacker to perform any screen operation or change settings on the device
  1. Potential for Root Access
    By unlocking the bootloader — a process surprisingly allowed on these tablets — attackers could gain root privileges, enabling them to fully control the device, install spyware, or further compromise system integrity.
No verification has been performed as it may have a permanent impact.
No verification has been performed as it may have a permanent impact.
  1. Network-Based Attacks
    Guest room tablets communicated with a central server controlling lighting and air conditioning. Researchers found that authentication between tablets and this server was poorly implemented. An attacker could pose as another room’s device by manipulating specific parameters in network requests, gaining control over other rooms’ amenities or even spying on chat communications with the concierge.
Network-Based Attacks
Network-Based Attacks
  1. Weak Wi-Fi Security
    The tablets used a stealth SSID for Wi-Fi communication, protected only by a passphrase embedded in the app code. Once deciphered, this provided attackers with access to the entire network, rendering even more rooms vulnerable.

The investigation found identical vulnerabilities in kiosk systems used by multiple hotels nationwide, indicating that this was not an isolated issue but a systemic flaw in how such Android kiosk tablets were deployed and secured.

The consequences of these flaws are alarming:

  • Remote Control of Guest Room Functions: Attackers could control AC, lights, and room service requests in other guest rooms.
  • Guest Privacy Breach: By accessing cameras, microphones, or chat logs.
  • Damage to Reputation: Luxury hotels could face severe backlash for compromising guest experiences and safety.

The vulnerabilities were responsibly disclosed to the affected hotels and the kiosk tablet developers through the Information-technology Promotion Agency (IPA).

All known issues have since been patched, and operational systems updated. Here are the recommended fixes for developers:

  • Disable USB Debugging Permanently: Ensure USB debugging is only accessible during authorized maintenance.
  • Restrict System Settings Access: Prevent changes during reboot by making the kiosk app the default launcher.
  • Enhance Network Security: Use WPA Enterprise authentication and client certificates to secure Wi-Fi communication.
  • Implement Server-Side Authentication: Associate unique credentials with each tablet to prevent unauthorized access to server-controlled functions.
  • Obfuscate App Code: Reduce ease of analysis through code encryption and other security practices.

This vulnerability underscores the critical need for robust security in IoT (Internet of Things) devices deployed in sensitive environments like hotels.

Developers must consider not only the features of their systems but also the potential avenues attackers could exploit. Hotels, in turn, must prioritize guest safety and privacy by rigorously testing and auditing third-party systems.

The vulnerabilities found in Android kiosk tablets highlight the delicate balance between convenience and security in modern technology.

While these systems offer unparalleled comfort and customization for guests, they also introduce new risks. Ensuring these devices are airtight against exploitation must be a top priority for developers and hoteliers alike.

Integrating Application Security into Your CI/CD Workflows Using Jenkins & Jira -> Free Webinar

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Juniper Routers Exploited via Magic Packet Vulnerability to Deploy Custom Backdoor

A sophisticated cyber campaign dubbed "J-magic" has been discovered targeting enterprise-grade Juniper routers with...

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Subaru’s STARLINK Connected Car’s Vulnerability Let Attackers Gain Restricted Access

In a groundbreaking discovery on November 20, 2024, cybersecurity researchers Shubham Shah and a...

CISA Releases Six ICS Advisories Details Security Issues

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued six Industrial Control Systems (ICS)...

Beware of Fake Captcha Verifications Spreading Lumma Malware

In January, Netskope Threat Labs uncovered a sophisticated global malware campaign leveraging fake CAPTCHA...