Feeds

Posh potty owners flushed by dodgy Bluetooth password

Power behind the throne

The Power of One eBook: Top reasons to choose HP BladeSystem

A high-tech toilet that takes care of everything except wiping its owner has been left wide open to attackers thanks to a basic security flaw.

toilet

Bluetooth blunder leaves bollocks prone to blasting

The Satis toilet, a $5,686 (£3,821) appliance built by Japanese (of course) manufacturer Lixil, is designed to open itself when the owner approaches, perfumes the air with deodorant while the user does their business, activates a bidet function and then a hot-air blower for drying before lowering its lid.

It can be activated by a My Satis application that sits on the user's smartphone and alerts the toilet when the user moves within Bluetooth range. But an investigation by Trustwave's Spiderlabs shows the application and toilet use a default 0000 password, meaning anyone with the app can activate the controls.

"An attacker could simply download the 'My Satis' application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner," its advisory reads. "Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user."

It's fair to say that anyone willing to splash out thousands of dollars on a top-class toilet isn't going to be too bothered by an increased water bill. But having the toilet seat bite you in the ass or getting an unexpected blast of water to the privates would be more discomforting – and the latter trick has been popular throughout the centuries.

Hellbrunn Palace

Austrian noblemen had a sick sense of humor

Visitors to the Austria's Hellbrunn Palace, built in the 17th century by Prince-Archbishop Markus Sittikus von Hohenems, will have used the ancient prankster's outdoor dining table with stone seats. Those invited to dine were bound by etiquette not to rise before Sittikus, and he used to enjoy firing water jets up through the seats and watching his guests' discomfort.

While such games might seem childish now, El Reg is willing to bet that there will be more than a few people out there who would take great delight in hanging around outside expensive bathrooms and listening to the screams as blasts of water or hot air are sent to the unfortunate user's unmentionable areas.

What the advisory does show, however, is the lamentable state of firmware security. Far too many vulnerable devices, from laptop batteries to nuclear missiles, have used default zeros as an access code and it's the first thing any enterprising hacker checks.

The advisory also shows that the company involved doesn't seem to be very interested in the problem. Trustwave contacted the vendor two months ago to fix this, but so far there's been no response, so if you do own a posh potty, be careful while you pee. ®

Designing a Defense for Mobile Applications

More from The Register

next story
Secure microkernel that uses maths to be 'bug free' goes open source
Hacker-repelling, drone-protecting code will soon be yours to tweak as you see fit
How long is too long to wait for a security fix?
Synology finally patches OpenSSL bugs in Trevor's NAS
Roll out the welcome mat to hackers and crackers
Security chap pens guide to bug bounty programs that won't fail like Yahoo!'s
HIDDEN packet sniffer spy tech in MILLIONS of iPhones, iPads – expert
Don't panic though – Apple's backdoor is not wide open to all, guru tells us
Researcher sat on critical IE bugs for THREE YEARS
VUPEN waited for Pwn2Own cash while IE's sandbox leaked
Four fake Google haxbots hit YOUR WEBSITE every day
Goog the perfect ruse to slip into SEO orfice
Putin: Crack Tor for me and I'll make you a MILLIONAIRE
Russian Interior Ministry offers big pile o' roubles for busting pro-privacy browser
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.