Category Archives: Product

Athom Homey Security Review | Transmits unencrypted WiFi credentials (CVE-2020-9462)


TL;DR: All Athom Homey and Athom Homey Pro devices, up to the current version (v4.2.0) transmit their initial configuration in the clear which includes your WiFi password. At the time of writing, Athom have no plans to fix this.


I will preface this with the fact that this vulnerability is not the most exciting in history, however, it is a vulnerability and the company should be doing better. The Athom Homey device is a smart-hub and can connect with other devices using a lot of different protocols.

In principle, the device is great as it means you should only have one place to orchestrate your smart home.

Despite it’s flaws, I actually really like this device.

Essentially, when setting up the device it has to connect to your WiFi network. The device has no exposed Ethernet port which is a shame, but, on the most part, this doesn’t seem to be a problem.

Athom Homey Security Vulnerability

The vulnerability only exists when going through the setup routine. The vulnerability exists because the device creates a temporary WiFi hotspot that is unencrypted which the user must connect to in order to perform the initial configuration. Crucially this means that when you configure the devices WiFi connection, you send the WiFi password in an unencrypted link to the device.

I sent Athom an email which contained the following:

The security vulnerability I wish to report to you today is the fact
that during sign up, your devices receive the WiFi security key without
being protected by any form of encryption. This means that an attacker
who is physically within range would be able to receive a copy of the
encryption key and therefore be able to gain unauthorised access to the
victim’s WiFi network. This is the same vulnerability that Amazon’s Ring
Doorbell made international news about in November 2019:

Read more about ring doorbell WiFi vulnerability

Which got the following response:

Thank you for your effort and letting us know your findings!

We are aware of the security risk involved in sending the credentials in plain text during setup of Homey.

We have made the decision back when this feature has been designed that while the process is in theory insecure, in practice it has a very low risk attack vector. In fact, there are many smart devices that use a similar way to set-up said devices.

Because the user must manually enable Wi-Fi Setup on Homey by turning it physically upside down, and another hacker must be present at the same time with equipment that’s not available to most, we have decided to focus our security efforts on more pressing matters. I am happy to say that 3rd party penetration tests have been performed on Homey and no one was able to gain access.

On a technical note, there is no secure way to set-up devices over a Wi-Fi hotspot without an out-of-band key. Homey does not have this printed in a manual, sticker etc. so we cannot simply issue an update. All other mechanisms are by definition unsafe because they rely on a shared secret, which is always crackable for any determined hacker.

We take the security and privacy of our users very seriously.

Not a bad response, though it got me to thinking…

It is true that other devices use a similar WiFi configuration routine, but, as demonstrated by Amazon’s Ring, it isn’t considered good enough on those devices either. It is also true that devices using completely different protocols, such as ZigBee, also have a similar type of key-exchange flaw. Again, it isn’t considered good enough here either.

I also don’t think it is fair to suggest that this configuration process only happens once. I’ve had this device for a while and I use it a fair bit and during that time I have ended up having to reset it and reconfigure it.

Nevermind that, but, it doesn’t take much to realise that an attacker could easily create a circumstance that would encourage the victim user to start this reconfiguration process even when it wasn’t needed.

So I sent them another email:

Thank you for your response an, but I respectfully disagree.

There are methods in a closed ecosystem to perform key exchange. For example, the software on the Homey could be instructed to use knowledge of an Athom internal Root Certificate Authority to perform Homey to Smart-phone authentication, and the user’s smart-phone could be issued with an identity that is cryptographically derived from Athom’s internal CA and as such can be trusted by the device.

This then provides encrypted comms between Homey and the Smart phone which is already a big step-up. In theory though, this could be subjected to a Man-in-the-Middle attack. For example, where another user with a legitimate certificate could trick the victim Homey and the victim smart-phone into communicating with the attacker. To prevent this circumstance it would be best to have mutual authentication, but that is very difficult to achieve with devices that have already been deployed. There is a solution though – either Diffie Hellman key exchange (DH KX) which reveals an active attacker the moment they stop intercepting communications, or a variant of DH KX called STS (Station to Station)…

Furthermore, the Homey does have the ability to perform out of band key validation – amongst other methods, it speaks! This would allow key exchange and validation to be completed in the same manner as Bluetooth key exchange is completed with a PIN number.

I’m also worried about your analysis of the risk involved – just because this only happens during setup and that there must be user interaction does not make it immune to problems. For example, it is perfectly possible for an active attacker within RF range to perform a de-authentication attack against the device until the user chooses to reset it. Granted that when calculating its CVSS, having user interaction does reduce the score, but, I would suggest the result is still relatively high at approximately 5.0, with a vector of CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N. This is owing to the ability of the attacker to not only intercept the communications which reveals the WiFi network key that in turn changes the scope of the attack, but also, because there is also the possibility of an integrity issue, such that at attacker could get the Homey device to connect to a malicious WiFi network and thus be able to perform other attacks against the device.

And finally, I don’t consider your assertion that “other people do this too” an adequate defence to your own lack of security. Just because it is done elsewhere does not make it right.

Please reconsider your position. I would be delighted to be of further help.

They were gracious enough to send me another response:

I do agree with some of the points you make, however, at this time we do not have the capacity to change Homey’s behavior during Wi-Fi setup. While you are technically right, we deem the attack vector to be small enough to be acceptable.

In any future products we will consider your findings.

As of this date, no fix for this is in place which is disappointing. You can find The official CVE for this issue by clicking here:

Learn how YGHT can help you imrpove your cybersecurity

Custom adhesive-backed laser cut privacy screens for laptops

Years ago I bought privacy screens for the company computers I was working for at the time. The reasons that I really hated them were:

  • I couldn’t stand the dirt and grime that constantly collected behind them
  • the unsightly attachment mechanisms and the fact that they kept falling off my laptop every time I closed the screen.

Eventually, I found a company that was willing to make a custom order for privacy screens and better still, they were self-adhesive which meant they couldn’t fall off, there were no ugly attachments, and they couldn’t get dirt stuck behind them.

I tried to find these guys again recently and really struggled – I kept finding garden screens and other random products on Amazon. After searching for a while I found the company again and now they even have an online shop. SO I don’t lose the link again, here they are: Protectionfilms24

The procedure to find the privacy screen for your computer, laptop or any device is pretty simple and user friendly if it is a standard size.  When you enter the website you will see the Blue box below.

When you press the arrow a list of devices will appear. Choose the device you want to add the privacy screen.

Screenshot_from_protectionfilms24-com_select_privacy_screen_for_a_device
Screenshot from protectionfilms24-com selecting a privacy screen for a device

The next step is to choose the brand of your device.

Screenshot_from_protectionfilms24 com_selecting_privacy_screen_for_the_right_Brand
Screenshot from protectionfilms24 com selecting privacy screen for the right Brand

They have more than 250.000 products so we can’t show the whole list. But they have privacy screens for all manner of devices, even for cars.

When you choose the right Brand for your device, Protectionfilms24 will provide a list of devices from the specific Brand you decided.

Screenshot_from_-protectionfilms24-com_choosing_the_right_device_from_a specific_Brand
Screenshot from -protectionfilms24-com choosing the right device from a specific Brand

After these three steps a list with results will appear that include the parameters you entered.

Privacy Screens help to protect from visual hackers, thus if you work in public spaces it is a good idea to use one.

Did you log into Facebook from somewhere new?

I just got a very strange email from Facebook.  Yes, that’s right – I do use Facebook occasionally.  It told me that I had logged into Facebook from a location that I am not known to come from. Also, they deemed it suspicious enough to warrant blocking my account until I had verified this with them.  Which you know, is nice – genuinely pleased that the feudal IT security model is in this instance working.

Source of Facebook login problem

So I dutifully login to verify my details.

Suddenly Facebook starts telling me about security and tries to give me details about what has just happened.  They are supposed to be clear enough for me to work out whether this access was genuine or not. 

But it fails to work out where geographically I am supposed to have logged in from. Facebook just leaves the area blank on the page that is supposed to be filled in. 

There is a small area where I can hover my mouse over for more technical information and, ah there we go –

its a private non-routable IP address….

Thats why they can’t work out where I was logged in.  No, wait a minute – private non-routable?  That sounds like it must have come from inside the Facebook network?!  It stated 10.82.x.x (wish I had taken a screenshot now, the first rule of evidence handling… whoops).

And there’s another thing, my password is really secure…  I don’t use the same password twice for anything. It’s not even something I try and remember. They are all random strings generated and stored in an encrypted format by a password handler.  My password has now changed but this is what it was:

BJ6KQXiF6xgC3E48Xw

That’s a little over 107 bits of entropy and roughly 183,000,000,000,000,000,000,000,000,000,000 different combinations so I feel comfortable on ruling out a brute force / dictionary / profile attack.  This doesn’t leave much,

1) Facebook has had a glitch and falsely alerted people to a security breach (twice),

2) They have a security breach or

3) The staff or the police etc are logging into my account.

I am going to throw this out there, what is going on? 

Has Facebook itself been hacked? 

It sure seems like it’s got a problem to me.

YGHT can help you increase the cybersecurity

Contact us and learn how