Researchers find major security flaw in Google Glass

By on
Researchers find major security flaw in Google Glass
A now-patched vulnerability allowed attackers to take full remote control of Google Glass and potentially gain a first person view of those wearing the glasses.

The attack would require a Glass user to scan a QR code that would force them onto a attacker-controlled wireless network.

Lookout Mobile researchers reported the flaw to Google on May 15 and it was patched on June 4 for the 10,000 pilot users of Glass.

Google limited QR code execution to points where the user had solicited it, Lookout researcher Marc Rogers said.

He said the fast response from Google set a "benchmark for how connected things should be secured going forward".

In Rogers' scenario demonstration video, a victim scanned a QR code at a bus stop and was pushed onto a network that was broadcast from an attacker's Wifi Pineapple.

They were then pushed to a custom page containing a known Android 4.0.4 web vulnerability to Glass allowing for remote control over the internet.

"When photographed by an unsuspecting Glass user, the code forced Glass to connect silently to a hostile wifi access point that we controlled. That access point in turn allowed us to spy on the connections Glass made, from web requests to images uploaded to my butt," Marc Rogers said.

"Both the vulnerability and its method of delivery are unique to Glass as a consequence of it becoming a connected thing."

Got a news tip for our journalists? Share it with us anonymously here.

Copyright © SC Magazine, Australia

Tags:

Most Read Articles

You must be a registered member of CRN to post a comment.
| Register

Poll

The channel is a juicy hacking target - are you improving security?
YES - recent attacks on MSPs spurred us to action
YES - we're ALWAYS improving our security stance
YES - we've noticed new forms of attack
NO - we're confident our past efforts are enough, but are always vigilant
NO - we don't see the need for change at this time
View poll archive

Log In

Username / Email:
Password:
  |  Forgot your password?