Connect with us

News

IoT light bulb manufacturer, Tuya, responds to security issues

It’s good to see companies are already working to fix the issues.

tuya sign
Image: Tuya
Giveaway: Enter to win a BLUETTI Charger 1 ($399 value): Enter Here

Just a heads up, if you buy something through our links, we may get a small share of the sale. It’s one of the ways we keep the lights on here. Click here for more.

You’ve probably seen all the articles floating around today about insecure IoT light bulbs. The short version is that credentials like Wi-Fi passwords and the information needed to control the device remotely are saved in plaintext, so they’re easily accessible to anyone with physical access. One of the companies mentioned, Tuya, reached out to us to state that it has been working on fixing the issues found with its light bulbs since the original blog post by Limited Results at the end of November.

Tuya bills itself as a “global ‘AI+IoT’ developer platform,” providing own-branded and OEM rebranded devices, apps, and IoT modules that all run on the Tuya Smart platform. Limited Results found that Wi-Fi credentials, Local Key, and DeviceID were all stored in plaintext on the two light bulb models tested. With Tuya having three types of standardized IoT modules across the 30,000 devices it has, it’s a fair bet that these two light bulbs were not the only affected devices.

Since then, Tuya has completed technical updates for all known issues, stating, “we [have] finished technical updates for all known issues and the Public Software App is now available on Google Play and App Store.” The company has also been working on updating all the customized apps for each of the OEMs that it handles manufacturing for, and there is a timeline for upgrades starting February.

On the hardware side, a spokesperson for the company says that firmware packages with the fixed security issues are ready, and that they “are scheduling a time with all of our clients to work with a specialized Tuya tech complete the upgrade.”

Now, AES encryption is implemented as the standard for all downstream network packets, and TLS encryption is implemented on the new firmware for all communications with Tuya’s Cloud.

One of the biggest issues, the storage of credentials in plaintext, has now been changed with the new version encrypting onboard storage. OTA upgrades will now be signed. This limits the ease of reflashing to run malicious code, although it probably won’t deter the most determined hackers.

All things considered, this is a positive direction from any company after a security hole is disclosed. We’d be happy if all companies behaved this way. Of course, we’d be even happier if security was designed in to start with.

What do you think? Is this comforting to know? Let us know down below in the comments or carry the discussion over to our Twitter or Facebook.

Editors’ Recommendations:

Follow us on Flipboard, Google News, or Apple News

Maker, meme-r, and unabashed geek with nearly half a decade of blogging experience at KnowTechie, SlashGear and XDA Developers. If it runs on electricity (or even if it doesn't), Joe probably has one around his office somewhere, with particular focus in gadgetry and handheld gaming. Shoot him an email at joe@knowtechie.com.

Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

More in News