<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
		<id>https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=IoT_Attack_Surface_Areas</id>
		<title>IoT Attack Surface Areas - Revision history</title>
		<link rel="self" type="application/atom+xml" href="https://wiki.owasp.org/index.php?action=history&amp;feed=atom&amp;title=IoT_Attack_Surface_Areas"/>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Attack_Surface_Areas&amp;action=history"/>
		<updated>2026-04-25T20:02:52Z</updated>
		<subtitle>Revision history for this page on the wiki</subtitle>
		<generator>MediaWiki 1.27.2</generator>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Attack_Surface_Areas&amp;diff=203976&amp;oldid=prev</id>
		<title>Craig Smith at 03:08, 30 November 2015</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Attack_Surface_Areas&amp;diff=203976&amp;oldid=prev"/>
				<updated>2015-11-30T03:08:49Z</updated>
		
		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;col class='diff-marker' /&gt;
				&lt;col class='diff-content' /&gt;
				&lt;tr style='vertical-align: top;' lang='en'&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan='2' style=&quot;background-color: white; color:black; text-align: center;&quot;&gt;Revision as of 03:08, 30 November 2015&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l1&quot; &gt;Line 1:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 1:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;lt;center&amp;gt;[https://www.owasp.org/index.php/OWASP_Internet_of_Things_Project#tab=IoT_Attack_Surface_Areas Back To The IoT Attack Surface Areas Project]&amp;lt;/center&amp;gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt;&amp;#160;&lt;/td&gt;&lt;td class='diff-marker'&gt;+&lt;/td&gt;&lt;td style=&quot;color:black; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;/div&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class='diff-marker'&gt;&amp;#160;&lt;/td&gt;&lt;td style=&quot;background-color: #f9f9f9; color: #333333; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #e6e6e6; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	<entry>
		<id>https://wiki.owasp.org/index.php?title=IoT_Attack_Surface_Areas&amp;diff=203953&amp;oldid=prev</id>
		<title>Craig Smith: Created page with &quot;The OWASP IoT Attack Surface Areas (DRAFT) are as follows:  {| border=&quot;1&quot; class=&quot;wikitable&quot; style=&quot;text-align: left&quot; ! Attack Surface ! Vulnerability |-  | '''Ecosystem Access...&quot;</title>
		<link rel="alternate" type="text/html" href="https://wiki.owasp.org/index.php?title=IoT_Attack_Surface_Areas&amp;diff=203953&amp;oldid=prev"/>
				<updated>2015-11-30T02:23:49Z</updated>
		
		<summary type="html">&lt;p&gt;Created page with &amp;quot;The OWASP IoT Attack Surface Areas (DRAFT) are as follows:  {| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot; ! Attack Surface ! Vulnerability |-  | &amp;#039;&amp;#039;&amp;#039;Ecosystem Access...&amp;quot;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;The OWASP IoT Attack Surface Areas (DRAFT) are as follows:&lt;br /&gt;
&lt;br /&gt;
{| border=&amp;quot;1&amp;quot; class=&amp;quot;wikitable&amp;quot; style=&amp;quot;text-align: left&amp;quot;&lt;br /&gt;
! Attack Surface&lt;br /&gt;
! Vulnerability&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Access Control'''&lt;br /&gt;
|&lt;br /&gt;
* Implicit trust between components&lt;br /&gt;
* Enrollment security&lt;br /&gt;
* Decommissioning system&lt;br /&gt;
* Lost access procedures&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Memory'''&lt;br /&gt;
|&lt;br /&gt;
* Cleartext usernames&lt;br /&gt;
* Cleartext passwords&lt;br /&gt;
* Third-party credentials&lt;br /&gt;
* Encryption keys&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Physical Interfaces'''&lt;br /&gt;
|&lt;br /&gt;
* Firmware extraction&lt;br /&gt;
* User CLI&lt;br /&gt;
* Admin CLI&lt;br /&gt;
* Privilege escalation&lt;br /&gt;
* Reset to insecure state&lt;br /&gt;
* Removal of storage media&lt;br /&gt;
|-&lt;br /&gt;
| '''Device Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Firmware'''&lt;br /&gt;
|&lt;br /&gt;
* Hardcoded credentials&lt;br /&gt;
* Sensitive information disclosure&lt;br /&gt;
* Sensitive URL disclosure&lt;br /&gt;
* Encryption keys&lt;br /&gt;
* Firmware version display and/or last update date&lt;br /&gt;
|- &lt;br /&gt;
| '''Device Network Services'''&lt;br /&gt;
|&lt;br /&gt;
* Information disclosure&lt;br /&gt;
* User CLI&lt;br /&gt;
* Administrative CLI&lt;br /&gt;
* Injection&lt;br /&gt;
* Denial of Service&lt;br /&gt;
* Unencrypted Services&lt;br /&gt;
* Poorly implemented encryption&lt;br /&gt;
* Test/Development Services&lt;br /&gt;
* Buffer Overflow&lt;br /&gt;
* UPnP&lt;br /&gt;
* Vulnerable UDP Services&lt;br /&gt;
* DoS&lt;br /&gt;
|- &lt;br /&gt;
| '''Administrative Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Security/encryption options&lt;br /&gt;
* Logging options&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
* Inability to wipe device&lt;br /&gt;
|- &lt;br /&gt;
| '''Local Data Storage'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted data&lt;br /&gt;
* Data encrypted with discovered keys&lt;br /&gt;
* Lack of data integrity checks&lt;br /&gt;
|- &lt;br /&gt;
| '''Cloud Web Interface'''&lt;br /&gt;
|&lt;br /&gt;
* SQL injection&lt;br /&gt;
* Cross-site scripting&lt;br /&gt;
* Cross-site Request Forgery&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Third-party Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Unencrypted PII sent&lt;br /&gt;
* Encrypted PII sent&lt;br /&gt;
* Device information leaked&lt;br /&gt;
* Location leaked&lt;br /&gt;
|- &lt;br /&gt;
| '''Update Mechanism'''&lt;br /&gt;
|&lt;br /&gt;
* Update sent without encryption&lt;br /&gt;
* Updates not signed&lt;br /&gt;
* Update location writable&lt;br /&gt;
* Update verification&lt;br /&gt;
* Malicious update&lt;br /&gt;
* Missing update mechanism&lt;br /&gt;
* No manual update mechanism&lt;br /&gt;
|- &lt;br /&gt;
| '''Mobile Application'''&lt;br /&gt;
|&lt;br /&gt;
* Implicitly trusted by device or cloud&lt;br /&gt;
* Username enumeration&lt;br /&gt;
* Account lockout&lt;br /&gt;
* Known default credentials&lt;br /&gt;
* Weak passwords&lt;br /&gt;
* Insecure data storage&lt;br /&gt;
* Transport encryption&lt;br /&gt;
* Insecure password recovery mechanism&lt;br /&gt;
* Two-factor authentication&lt;br /&gt;
|- &lt;br /&gt;
| '''Vendor Backend APIs'''&lt;br /&gt;
|&lt;br /&gt;
* Inherent trust of cloud or mobile application&lt;br /&gt;
* Weak authentication&lt;br /&gt;
* Weak access controls&lt;br /&gt;
* Injection attacks&lt;br /&gt;
|- &lt;br /&gt;
| '''Ecosystem Communication'''&lt;br /&gt;
|&lt;br /&gt;
* Health checks&lt;br /&gt;
* Heartbeats&lt;br /&gt;
* Ecosystem commands&lt;br /&gt;
* Deprovisioning&lt;br /&gt;
* Pushing updates&lt;br /&gt;
|- &lt;br /&gt;
| '''Network Traffic'''&lt;br /&gt;
|&lt;br /&gt;
* LAN&lt;br /&gt;
* LAN to Internet&lt;br /&gt;
* Short range&lt;br /&gt;
* Non-standard&lt;br /&gt;
|- &lt;br /&gt;
|}&lt;/div&gt;</summary>
		<author><name>Craig Smith</name></author>	</entry>

	</feed>