JanSt

Android Exploit of the Week. Hell, evah...

http://i.dailymail.co.uk/i/pix/2012/12/17/article-0-168DFAC0000005DC-999_634x409.jpg

Nothing's sacred...

According to an advisory published by the Trustwave SpiderLabs, the “My Satis” Android application that is used to control Japanese smart toilets has a hard-coded Bluetooth PIN. The code can be used to control any, yes, any Satis
smart toilet. Worse, the PIN is 0000.
In enemy hands this code could have disastrous fall-out.
“An attacker could simply download the ‘My Satis’ application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner. Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user,” experts noted.

The real scandal? The issue has been known since June. Nothing has been done by the developers to fix this exploit.
One also has to wonder why NSA-leaker Snowden has not warned flushers of this issue? What kind of game is he playing?

No, today is not April 1st, and this is a very pressing issue.
Get My Satis in the Play Store

Full story here

http://2.bp.blogspot.com/-WZlnWSAk9y0/UVSZn7jhCZI/AAAAAAAAACg/u4I5uxQ4-ig/s200/disaster+toilets.jpg

Add a comment
0 comments
Email:

You don't need an account to comment. Just enter your email address. We'll keep it private.

Comment: