Author:
Casagrande Marco,Losiouk Eleonora,Conti Mauro,Payer Mathias,Antonioli Daniele
Abstract
Xiaomi is the leading company in the fitness tracking industry. Successful attacks on its fitness tracking ecosystem would result in severe consequences, including the loss of sensitive health and personal data. Despite these relevant risks, we know very little about the security mechanisms adopted by Xiaomi. In this work, we uncover them and show that they are insecure. In particular, Xiaomi protects its fitness tracking ecosystem with custom application-layer protocols spoken over insecure Bluetooth Low-Energy (BLE) connections (ignoring standard BLE security mechanisms already supported by their devices) and TLS connections. We identify severe vulnerabilities affecting such proprietary protocols, including unilateral and replayable authentication. Those issues are critical as they affect all Xiaomi trackers released since 2016 and up-to-date Xiaomi companion apps for Android and iOS. We show in practice how to exploit the identified vulnerabilities by presenting six impactful attacks. Four attacks enable to wirelessly impersonate any Xiaomi fitness tracker and companion app, man-in-the-middle (MitM) them, and eavesdrop on their communication. The other two attacks leverage a malicious Android application to remotely eavesdrop on data from a tracker and impersonate a Xiaomi fitness app. Overall, the attacks have a high impact as they can be used to exfiltrate and inject sensitive data from any Xiaomi tracker and compatible app. We propose five practical and low-overhead countermeasures to mitigate the presented vulnerabilities. Moreover, we present breakmi, a modular toolkit that we developed to automate our reverse-engineering process and attacks. breakmi understands Xiaomi application-layer proprietary protocols, reimplements Xiaomi security mechanisms, and automatically performs our attacks. We demonstrate that our toolkit can be generalized by extending it to be compatible with the Fitbit ecosystem. We will open-source breakmi.
Publisher
Universitatsbibliothek der Ruhr-Universitat Bochum
Subject
General Earth and Planetary Sciences,General Environmental Science
Cited by
5 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. U-Fuzz: Stateful Fuzzing of IoT Protocols on COTS Devices;2024 IEEE Conference on Software Testing, Verification and Validation (ICST);2024-05-27
2. Wearable Activity Trackers: A Survey on Utility, Privacy, and Security;ACM Computing Surveys;2024-04-09
3. AoT - Attack on Things: A security analysis of IoT firmware updates;2023 IEEE 8th European Symposium on Security and Privacy (EuroS&P);2023-07
4. Post-mortem digital forensics analysis of the Zepp Life android application;Forensic Science International: Digital Investigation;2023-06
5. E-Spoofer: Attacking and Defending Xiaomi Electric Scooter Ecosystem;Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks;2023-05-29