The LIXIL Corporation My SATIS Genius Toilet application for Android has a hardcoded Bluetooth PIN, which allows physically proximate attackers to trigger physical resource consumption (water or heat) or user discomfort.
References
Configurations
History
21 Nov 2024, 01:56
Type | Values Removed | Values Added |
---|---|---|
References | () http://arstechnica.com/security/2013/08/holy-sht-smart-toilet-hack-attack/ - | |
References | () http://packetstormsecurity.com/files/122655/LIXIL-Satis-Toilet-Hard-Coded-Bluetooth-PIN.html - | |
References | () http://seclists.org/fulldisclosure/2013/Aug/18 - | |
References | () http://www.huffingtonpost.co.uk/2013/08/05/smart-toilet-could-attackmy-satis_n_3706116.html - | |
References | () http://www.independent.co.uk/life-style/gadgets-and-tech/features/now-even-toilets-arent-safe-from-hacking-8747232.html - | |
References | () https://www.trustwave.com/spiderlabs/advisories/TWSL2013-020.txt - |
Information
Published : 2015-04-16 23:59
Updated : 2025-04-12 10:46
NVD link : CVE-2013-4866
Mitre link : CVE-2013-4866
CVE.ORG link : CVE-2013-4866
JSON object : View
Products Affected
lixil
- my_satis_genius_toilet
CWE