Tuesday, March 4, 2025
HomeInternet30,000 Hot Bathtubs are vulnerable to Remote Attack by Hackers

30,000 Hot Bathtubs are vulnerable to Remote Attack by Hackers

Published on

SIEM as a Service

Follow Us on Google News

Researchers discovered a serious flaw in more than 30,000 IoT connected bathtubs that can be authenticated by remote attackers to control the vulnerable tub located in your home.

Ceri Coburn , a company that offers a mobile app as a Water App that controlling more than 30,000 hot tubs.

The App allows the user to control their tub using various app controls including heat it and turn it off when you’re not using it.

An investigation that conducted by researchers revealed that the app
didn’t seem to authenticate users so they aim to dig into the deep by reversing the app and its control with Tub.

Pentesting the Tub connectivity with app

Ceri app is connected with Wi-Fi access point on the tub. same as most of the IoT devices, mobile app can connect as a client and control the tub locally.

According to pentestpartners, ” it can also configure the tub controller to be a client on your home network, so remote control from anywhere is possible through an API. Hence, we can geo-locate hot tubs on https://wigle.net â€“ simply search for : https://wigle.net/search?ssidlike=BWGSpa%25 and you’ll find the tubs that were still in AP mode when geo-located. “

In this connected there is no PSK assigned with AP that leads to anyone can stand near the home and connected with hot tub and control it.

Along with this researchers found that there was no authentication was defined with API also the app using  cloud service from iDigi for control.

Further investigation reveal that the app cloud login credentials are authenticate with plaintext.

bathtubs

According to pentestpartners, someone can mess around with your hot tub. It’s hardly nation state grade ransomware, but it was damn good fun finding and exploiting this vulnerability on ours and Ceri’s hot tub.

“However, there is a more serious side: it’s easy to turn your temperature down so your tub becomes unusable. It’s also easy to heat it continuously, wasting electricity.”

Blowers are also only turned on when someone is in the tub, so the hacker can figure out if you’re in the tub at the time, Researchers said.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

Bubba AI, Inc. is Launching Comp AI to Help 100,000 Startups Get SOC 2 Compliant by 2032.

With the growing importance of security compliance for startups, more companies are seeking to...

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

IBM Storage Virtualize Flaws Allow Remote Code Execution

Two critical security flaws in IBM Storage Virtualize products could enable attackers to bypass...

Progress WhatsUp Gold Path Traversal Vulnerability Exposes Systems to Remote code Execution

A newly disclosed path traversal vulnerability (CVE-2024-4885) in Progress Software’s WhatsUp Gold network monitoring...

CISA Alerts on Active Exploitation of Cisco Small Business Router Flaw

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) issued an urgent warning on March...