Visible to the public Trampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers

TitleTrampoline Over the Air: Breaking in IoT Devices Through MQTT Brokers
Publication TypeConference Paper
Year of Publication2022
AuthorsXu, Huikai, Yu, Miao, Wang, Yanhao, Liu, Yue, Hou, Qinsheng, Ma, Zhenbang, Duan, Haixin, Zhuge, Jianwei, Liu, Baojun
Conference Name2022 IEEE 7th European Symposium on Security and Privacy (EuroS&P)
KeywordsAir gaps, composability, data transfer, denial-of-service attack, Ethics, fuzzing, Human Behavior, Internet of Things, IoT, Metrics, MQTT, performance evaluation, pubcrawl, resilience, Resiliency, Transportation
AbstractMQTT is widely adopted by IoT devices because it allows for the most efficient data transfer over a variety of communication lines. The security of MQTT has received increasing attention in recent years, and several studies have demonstrated the configurations of many MQTT brokers are insecure. Adversaries are allowed to exploit vulnerable brokers and publish malicious messages to subscribers. However, little has been done to understanding the security issues on the device side when devices handle unauthorized MQTT messages. To fill this research gap, we propose a fuzzing framework named ShadowFuzzer to find client-side vulnerabilities when processing incoming MQTT messages. To avoiding ethical issues, ShadowFuzzer redirects traffic destined for the actual broker to a shadow broker under the control to monitor vulnerabilities. We select 15 IoT devices communicating with vulnerable brokers and leverage ShadowFuzzer to find vulnerabilities when they parse MQTT messages. For these devices, ShadowFuzzer reports 34 zero-day vulnerabilities in 11 devices. We evaluated the exploitability of these vulnerabilities and received a total of 44,000 USD bug bounty rewards. And 16 CVE/CNVD/CN-NVD numbers have been assigned to us.
DOI10.1109/EuroSP53844.2022.00019
Citation Keyxu_trampoline_2022