Jump to content

Amazon Echo physical vulnerability discovered, 2015-2016 devices affected

Sauron

Source: https://labs.f-secure.com/archive/alexa-are-you-listening/

 

Apparently all 2015 and 2016 Amazon Echo devices are vulnerable to a physical exploit that allows an attacker to gain root access to the system. The exploit (detailed in the source) is fairly trivial to take advantage of and leaves no trace. It uses the exposed debug pads on the Echo's logic board to boot the device off of an SD card, which is then used to take control of the firmware (effectively a Linux based system).

 

EchoLab2

 

The setup might seem impractical but consider that the wires are only there for the researchers' convenience - one could easily construct an adhesive breakout board and attach it to the debug pads or find some other way of connecting to the pads without soldering.

 

There is no fix you can implement on a vulnerable model, however the issue has been resolved with the 2017 release; here's how you can check if your device is vulnerable:

Quote

This vulnerability has been confirmed on the 2015 and 2016 edition of the Amazon Echo however the 2017 edition is not vulnerable to this physical attack. The mitigation implemented by Amazon was to join the +3V input pad with the MOSI/CMD pad somewhere on the main board, this effectively disables SPI communications with an external SD Card, preventing external booting. 

To identify if a device is vulnerable you can check the original pack for a 2017 copyright and a device model number ending 02.

Image of the vulnerable 2016 edition with the model number 23-002518-01:

oldModel

Image of the fixed 2017 edition with the model number 23-002518-02:

newModel

Note the white edition has a slightly different number of 23-002517-0x.

The attack requires physical access so it's not as bad as it could be, however, as the researchers pointed out, this poses a big risk for public deployments such as hotel rooms.

Quote

Rooting an Amazon Echo was trivial however it does require physical access which is a major limitation. However, product developers should not take it for granted that their customers won't expose their devices to uncontrolled environments such as hotel rooms

My opinion:

Don't buy devices that require an open microphone to work and don't publish their source code. If you go to a hotel with an Echo device in the room, disconnect the power - even if it's post 2017; just because it's not vulnerable to this attack doesn't mean it's not vulnerable to undiscovered ones. It's just a privacy hazard.

 

-edit-

I should add that this is fairly old news, but since this wasn't talked about on the forums I thought it was worth sharing.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

33 minutes ago, Sauron said:

My opinion:

Don't buy devices that require an open microphone to work and don't publish their source code. If you go to a hotel with an Echo device in the room, disconnect the power - even if it's post 2017; just because it's not vulnerable to this attack doesn't mean it's not vulnerable to undiscovered ones. It's just a privacy hazard.

You DO realise if its based on GNU Linux it would be illegal to NOT publish the source code, right?

 

Also, if you don't publish source code then its harder to find more easily exploitable software issues or if the device is deliberately snooping on you, which are a far bigger risk than this.

 

Almost all devices have physical exploits, they exist so the factory can flash the firmware in the first place and IMO are a good thing, as it means if the manufacturer stops supporting a device you can hack it and continue using it, rather than it ending up as e-waste.

 

That fix is also laughable, as if the lines have been joined on the PCB then they can be disconnected again, it just takes a little more work.  (potentially a few seconds with a sharp craft knife once you've found the spot)

Router:  Intel N100 (pfSense) WiFi6: Zyxel NWA210AX (1.7Gbit peak at 160Mhz)
WiFi5: Ubiquiti NanoHD OpenWRT (~500Mbit at 80Mhz) Switches: Netgear MS510TXUP, MS510TXPP, GS110EMX
ISPs: Zen Full Fibre 900 (~930Mbit down, 115Mbit up) + Three 5G (~800Mbit down, 115Mbit up)
Upgrading Laptop/Desktop CNVIo WiFi 5 cards to PCIe WiFi6e/7

Link to comment
Share on other sites

Link to post
Share on other sites

4 hours ago, Alex Atkin UK said:

You DO realise if its based on GNU Linux it would be illegal to NOT publish the source code, right?

They have to publish the source of the kernel and open source components, but not of their apps. His point is nobody can see what the app actually does.

F@H
Desktop: i9-13900K, ASUS Z790-E, 64GB DDR5-6000 CL36, RTX3080, 2TB MP600 Pro XT, 2TB SX8200Pro, 2x16TB Ironwolf RAID0, Corsair HX1200, Antec Vortex 360 AIO, Thermaltake Versa H25 TG, Samsung 4K curved 49" TV, 23" secondary, Mountain Everest Max

Mobile SFF rig: i9-9900K, Noctua NH-L9i, Asrock Z390 Phantom ITX-AC, 32GB, GTX1070, 2x1TB SX8200Pro RAID0, 2x5TB 2.5" HDD RAID0, Athena 500W Flex (Noctua fan), Custom 4.7l 3D printed case

 

Asus Zenbook UM325UA, Ryzen 7 5700u, 16GB, 1TB, OLED

 

GPD Win 2

Link to comment
Share on other sites

Link to post
Share on other sites

19 minutes ago, Kilrah said:

They have to publich the source of the kernel and open source components, but not of their apps. His point is nobody can see what the app actually does.

Apologies, I completely misread that to mean the opposite of what he said.  DOH!?‍♂️

Router:  Intel N100 (pfSense) WiFi6: Zyxel NWA210AX (1.7Gbit peak at 160Mhz)
WiFi5: Ubiquiti NanoHD OpenWRT (~500Mbit at 80Mhz) Switches: Netgear MS510TXUP, MS510TXPP, GS110EMX
ISPs: Zen Full Fibre 900 (~930Mbit down, 115Mbit up) + Three 5G (~800Mbit down, 115Mbit up)
Upgrading Laptop/Desktop CNVIo WiFi 5 cards to PCIe WiFi6e/7

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, Sauron said:

Source: https://labs.f-secure.com/archive/alexa-are-you-listening/

 

Apparently all 2015 and 2016 Amazon Echo devices are vulnerable to a physical exploit that allows an attacker to gain root access to the system. The exploit (detailed in the source) is fairly trivial to take advantage of and leaves no trace. It uses the exposed debug pads on the Echo's logic board to boot the device off of an SD card, which is then used to take control of the firmware (effectively a Linux based system).

 

EchoLab2

 

The setup might seem impractical but consider that the wires are only there for the researchers' convenience - one could easily construct an adhesive breakout board and attach it to the debug pads or find some other way of connecting to the pads without soldering.

 

There is no fix you can implement on a vulnerable model, however the issue has been resolved with the 2017 release; here's how you can check if your device is vulnerable:

The attack requires physical access so it's not as bad as it could be, however, as the researchers pointed out, this poses a big risk for public deployments such as hotel rooms.

My opinion:

Don't buy devices that require an open microphone to work and don't publish their source code. If you go to a hotel with an Echo device in the room, disconnect the power - even if it's post 2017; just because it's not vulnerable to this attack doesn't mean it's not vulnerable to undiscovered ones. It's just a privacy hazard.

 

-edit-

I should add that this is fairly old news, but since this wasn't talked about on the forums I thought it was worth sharing.

There is a fix... Glue on the pads and don't let your roommate (who also is studying "evil genius hacker" at college) into your room.

Link to comment
Share on other sites

Link to post
Share on other sites

11 minutes ago, 404usrnmntfnd said:

Why the hell did Amazon put debug pads on the final release

Debug pads are often used for individual product testing before they are shipped. The problem here is that the configuration of those pads allows you to boot off external storage, which is definitely unnecessary for quality assessments.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

... I feel like if someone got into your house for long enough to do this to a echo you have bigger more imediate problems...

I live in misery USA. my timezone is central daylight time which is either UTC -5 or -4 because the government hates everyone.

into trains? here's the model railroad thread!

Link to comment
Share on other sites

Link to post
Share on other sites

10 minutes ago, will4623 said:

... I feel like if someone got into your house for long enough to do this to a echo you have bigger more imediate problems...

What about someone staying at a hotel with Echo devices in the rooms doing this and listening in on other guests?

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

Just now, Sauron said:

What about someone staying at a hotel with Echo devices in the rooms doing this and listening in on other guests?

I mean that is a different can of worms because just implant a microphone whether or not it is fixed.

I live in misery USA. my timezone is central daylight time which is either UTC -5 or -4 because the government hates everyone.

into trains? here's the model railroad thread!

Link to comment
Share on other sites

Link to post
Share on other sites

3 hours ago, will4623 said:

I mean that is a different can of worms because just implant a microphone whether or not it is fixed.

Yes, but that would be much harder to hide, power and connect to the internet in a reliable way. This is something literally anyone would have the means of doing, it doesn't require expertise or any prior preparation other than taking a small and cheap pcb with you.

2 hours ago, 404usrnmntfnd said:

It would be so simple to make it not bootable. It would take like 1 change

Which is why the 2017 model isn't affected.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

Sounds like a big nothingburger to me, if anything it's cool since you can root it and do other stuff with it. No one's going to come to my place with a programming jig to root my echo without me knowing (not that I have one in the first place).

 

Hotels use a special version that came out after this. If some used the home version before that it was already sketchy since the behavior of the home version was never designed for multiple users changing all the time in the first place.

F@H
Desktop: i9-13900K, ASUS Z790-E, 64GB DDR5-6000 CL36, RTX3080, 2TB MP600 Pro XT, 2TB SX8200Pro, 2x16TB Ironwolf RAID0, Corsair HX1200, Antec Vortex 360 AIO, Thermaltake Versa H25 TG, Samsung 4K curved 49" TV, 23" secondary, Mountain Everest Max

Mobile SFF rig: i9-9900K, Noctua NH-L9i, Asrock Z390 Phantom ITX-AC, 32GB, GTX1070, 2x1TB SX8200Pro RAID0, 2x5TB 2.5" HDD RAID0, Athena 500W Flex (Noctua fan), Custom 4.7l 3D printed case

 

Asus Zenbook UM325UA, Ryzen 7 5700u, 16GB, 1TB, OLED

 

GPD Win 2

Link to comment
Share on other sites

Link to post
Share on other sites

Why should I go through the trouble of fixing this with SCIENCE! when I could simply reach for the 9mm? 

Cor Caeruleus Reborn v6

Spoiler

CPU: Intel - Core i7-8700K

CPU Cooler: be quiet! - PURE ROCK 
Thermal Compound: Arctic Silver - 5 High-Density Polysynthetic Silver 3.5g Thermal Paste 
Motherboard: ASRock Z370 Extreme4
Memory: G.Skill TridentZ RGB 2x8GB 3200/14
Storage: Samsung - 850 EVO-Series 500GB 2.5" Solid State Drive 
Storage: Samsung - 960 EVO 500GB M.2-2280 Solid State Drive
Storage: Western Digital - Blue 2TB 3.5" 5400RPM Internal Hard Drive
Storage: Western Digital - BLACK SERIES 3TB 3.5" 7200RPM Internal Hard Drive
Video Card: EVGA - 970 SSC ACX (1080 is in RMA)
Case: Fractal Design - Define R5 w/Window (Black) ATX Mid Tower Case
Power Supply: EVGA - SuperNOVA P2 750W with CableMod blue/black Pro Series
Optical Drive: LG - WH16NS40 Blu-Ray/DVD/CD Writer 
Operating System: Microsoft - Windows 10 Pro OEM 64-bit and Linux Mint Serena
Keyboard: Logitech - G910 Orion Spectrum RGB Wired Gaming Keyboard
Mouse: Logitech - G502 Wired Optical Mouse
Headphones: Logitech - G430 7.1 Channel  Headset
Speakers: Logitech - Z506 155W 5.1ch Speakers

 

Link to comment
Share on other sites

Link to post
Share on other sites

10 hours ago, Sauron said:

Yes, but that would be much harder to hide, power and connect to the internet in a reliable way. This is something literally anyone would have the means of doing, it doesn't require expertise or any prior preparation other than taking a small and cheap pcb with you.

Which is why the 2017 model isn't affected.

Not really any much harder if you think about it.

 

If you have the time to open an echo and root it physically, then you could equally put a Pi Mini into a none-rootable echo and leech power from the PCB.  Scripting a login to the hotel WiFi isn't that hard and you could always tap off the echos microphone into a USB mic adapter on the Pi.

 

Yes its a little more complicated, but honestly if you are only skilled enough to install an off-the-shelf physical hack then what are the odds you can open up an echo without visible damage or breaking it in the first place?

Router:  Intel N100 (pfSense) WiFi6: Zyxel NWA210AX (1.7Gbit peak at 160Mhz)
WiFi5: Ubiquiti NanoHD OpenWRT (~500Mbit at 80Mhz) Switches: Netgear MS510TXUP, MS510TXPP, GS110EMX
ISPs: Zen Full Fibre 900 (~930Mbit down, 115Mbit up) + Three 5G (~800Mbit down, 115Mbit up)
Upgrading Laptop/Desktop CNVIo WiFi 5 cards to PCIe WiFi6e/7

Link to comment
Share on other sites

Link to post
Share on other sites

2 hours ago, Alex Atkin UK said:

If you have the time to open an echo and root it physically, then you could equally put a Pi Mini into a none-rootable echo and leech power from the PCB.

That isn't untraceable. It also requires soldering and a bunch of material that most likely doesn't fit in the Echo.

Spoiler

https://d3nevzfk7ii3be.cloudfront.net/igi/lAdPFSTgCeSWZbOD.huge

2 hours ago, Alex Atkin UK said:

Scripting a login to the hotel WiFi isn't that hard

It actually might be depending on how it's set up. Also I can only imagine how badly the Echo's wifi would interfere with the malicious device.

2 hours ago, Alex Atkin UK said:

you could always tap off the echos microphone into a USB mic adapter on the Pi.

Not necessarily, and remember that the Echo would need to keep working properly for this to have any chance of not being immediately found out.

2 hours ago, Alex Atkin UK said:

Yes its a little more complicated, but honestly if you are only skilled enough to install an off-the-shelf physical hack then what are the odds you can open up an echo without visible damage or breaking it in the first place?

The Echo is quite easy to open, and regardless this isn't about technical prowess on the attacker's part. Using an exploit like this is infinitely more practical than a janky pi 0 wiretap that you have to solder and somehow hide in the extremely small space on the bottom of the Echo, even if it worked.

 

Obviously you can't be sure the room has no hidden microphones in it but that takes effort, money and precise intention whereas this is easier, faster and costs basically nothing to do.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

On 2/11/2020 at 4:43 PM, Sauron said:

Yes, but that would be much harder to hide, power and connect to the internet in a reliable way. This is something literally anyone would have the means of doing, it doesn't require expertise or any prior preparation other than taking a small and cheap pcb with you.

alright but they could hide a microphone anywhere anyway. and then they could have it premade.

I live in misery USA. my timezone is central daylight time which is either UTC -5 or -4 because the government hates everyone.

into trains? here's the model railroad thread!

Link to comment
Share on other sites

Link to post
Share on other sites

1 hour ago, will4623 said:

alright but they could hide a microphone anywhere anyway. and then they could have it premade.

I guess they could also just kidnap you and torture you until you reveal the information they want. That's not the point. Premade or not it would have a cost, it could be found or thrown away by the cleaning service, it would be hard to power and connect reliably (can't exactly connect it to the power outlets), it probably wouldn't be hard to trace back to you if it were found. That's not something you might want to put the effort in in the off chance that hotel guests say something important. This, on the other hand, is so easy and cheap that it's worth the small time investment.

Don't ask to ask, just ask... please 🤨

sudo chmod -R 000 /*

Link to comment
Share on other sites

Link to post
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now

×