How to Attack and Defend a Prosthetic Arm
#1
Information 
Quote:[Image: Scheme_bionic_arm.jpg]

Each arm is equipped with an embedded SIM card for sending statistical data. The SIM is needed to access the internet and send statistics and other information about the arm’s status. A connection is established to Motorica’s remote cloud, which is an interface for remotely monitoring the status of all registered biomechanical arms. Good thing about the arm’s current architecture – the connection between the arm and the cloud in unidirectional. This means that only the arm is sending data to the cloud, while the cloud sends nothing back. Yet, Motorica Inc says, they plan to implement this feature later.

The basic logic of the arm, such as movement directions, switching motors on or off, etc., are implemented in the C language. The cloud for receiving, processing and storing information is implemented based on the following technologies:
  • NodeJS – for backend,

  • ReactJS – for frontend,

  • MongoDB – database.
Arm-wrestling

At first, we decided to attack the logic of the arm. But soon we discovered that the C code is well-structured and has no vulnerabilities in it. However, the arm that we tested has only the basic functionality. Motorica Inc. wants to add more functions to its biomechanical limbs: smartphone interconnect, contactless payments and other useful features. From our point of view, all these new technologies must be tested for cybersecurity. Especially the ones that could be exploited for MiTM attacks.

Then we started to analyze the protocol used to send the statistics to the cloud and the logic for processing that information on the server. The initial findings showed that the data was sent using the insecure HTTP protocol. A little later we found some incorrect account operations and insufficient input validation that can be used by a remote attacker to:
  • gain access to information about all the accounts in the cloud including the logins and passwords (in plaintext) for all the prosthetic arms and administrators,

  • add or delete regular and privileged users (with administrator rights),

  • launch attacks against administrators via the cloud and then attack Motorica’s internal infrastructure,

  • NoSQL-injection,

  • cause denial of service for cloud administrator.
[-] The following 1 user says Thank You to harlan4096 for this post:
  • darktwilight
Reply


Forum Jump:


Users browsing this thread: 1 Guest(s)
[-]
Welcome
You have to register before you can post on our site.

Username/Email:


Password:





[-]
Recent Posts
GFYI [Official] Master PDF Editor Mothe...
It lets me edit, com...zevish — 09:52
XYplorer
What's new in Rele...Kool — 07:35
AMD releases updated FidelityFX SDK feat...
FidelityFX SDK 1.1...harlan4096 — 06:44
AnyDesk 9.5.2 for Windows
AnyDesk 9.5.2 for ...harlan4096 — 06:42
LibreOffice 24.8.7
Berlin, 8 May 2025...harlan4096 — 06:42

[-]
Birthdays
Today's Birthdays
avatar (38)omapek
avatar (47)Geraldtuh
Upcoming Birthdays
avatar (27)akiratoriyama
avatar (47)Jerrycix
avatar (39)awedoli
avatar (81)WinRARHowTo
avatar (37)owysykan
avatar (48)beautgok
avatar (38)axuben
avatar (44)talsmanthago
avatar (30)mocetor
avatar (45)piomaibhaict
avatar (50)kingbfef
avatar (37)izenesiq
avatar (39)ihijudu
avatar (44)tiojusop
avatar (41)Damiennug
avatar (39)acoraxe
avatar (48)contjrat
avatar (40)axylisyb
avatar (43)tukrublape
avatar (43)knigiJow
avatar (45)1stOnecal
avatar (49)Mirzojap
avatar (35)idilysaju
avatar (39)GregoryRog
avatar (44)mediumog
avatar (39)odukoromu
avatar (45)Joanna4589

[-]
Online Staff
There are no staff members currently online.

>