Feeds

Posh potty owners flushed by dodgy Bluetooth password

Power behind the throne

Boost IT visibility and business value

A high-tech toilet that takes care of everything except wiping its owner has been left wide open to attackers thanks to a basic security flaw.

toilet

Bluetooth blunder leaves bollocks prone to blasting

The Satis toilet, a $5,686 (£3,821) appliance built by Japanese (of course) manufacturer Lixil, is designed to open itself when the owner approaches, perfumes the air with deodorant while the user does their business, activates a bidet function and then a hot-air blower for drying before lowering its lid.

It can be activated by a My Satis application that sits on the user's smartphone and alerts the toilet when the user moves within Bluetooth range. But an investigation by Trustwave's Spiderlabs shows the application and toilet use a default 0000 password, meaning anyone with the app can activate the controls.

"An attacker could simply download the 'My Satis' application and use it to cause the toilet to repeatedly flush, raising the water usage and therefore utility cost to its owner," its advisory reads. "Attackers could cause the unit to unexpectedly open/close the lid, activate bidet or air-dry functions, causing discomfort or distress to user."

It's fair to say that anyone willing to splash out thousands of dollars on a top-class toilet isn't going to be too bothered by an increased water bill. But having the toilet seat bite you in the ass or getting an unexpected blast of water to the privates would be more discomforting – and the latter trick has been popular throughout the centuries.

Hellbrunn Palace

Austrian noblemen had a sick sense of humor

Visitors to the Austria's Hellbrunn Palace, built in the 17th century by Prince-Archbishop Markus Sittikus von Hohenems, will have used the ancient prankster's outdoor dining table with stone seats. Those invited to dine were bound by etiquette not to rise before Sittikus, and he used to enjoy firing water jets up through the seats and watching his guests' discomfort.

While such games might seem childish now, El Reg is willing to bet that there will be more than a few people out there who would take great delight in hanging around outside expensive bathrooms and listening to the screams as blasts of water or hot air are sent to the unfortunate user's unmentionable areas.

What the advisory does show, however, is the lamentable state of firmware security. Far too many vulnerable devices, from laptop batteries to nuclear missiles, have used default zeros as an access code and it's the first thing any enterprising hacker checks.

The advisory also shows that the company involved doesn't seem to be very interested in the problem. Trustwave contacted the vendor two months ago to fix this, but so far there's been no response, so if you do own a posh potty, be careful while you pee. ®

Gartner critical capabilities for enterprise endpoint backup

More from The Register

next story
Microsoft: We plan to CLEAN UP this here Windows Store town
Paid-for apps that provide free downloads? Really
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
Who needs hackers? 'Password1' opens a third of all biz doors
GPU-powered pen test yields more bad news about defences and passwords
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
Hear ye, young cyber warriors of the realm: GCHQ wants you
Get involved, get a job and then never discuss work ever again
Chinese hackers spied on investigators of Flight MH370 - report
Classified data on flight's disappearance pinched
Microsoft cries UNINSTALL in the wake of Blue Screens of Death™
Cache crash causes contained choloric calamity
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
BYOD's dark side: Data protection
An endpoint data protection solution that adds value to the user and the organization so it can protect itself from data loss as well as leverage corporate data.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?