For years, a backdoor in popular KiwiSDR product gave root to project developer

Screenshot of Kiwi SDR.

Enlarge (credit: KiwiSDR)

KiwiSDR is hardware that uses a software-defined radio to monitor transmissions in a local area and stream them over the Internet. A largely hobbyist base of users do all kinds of cool things with the playing-card-sized devices. A user in, say, Manhattan can connect one to the Internet so that people in, say, Madrid, Spain, or Sydney, Australia, can listen to AM radio broadcasts, CB radio conversations, or even watch lightning storms in Manhattan.

On Wednesday, users learned that for years their devices had been equipped with a backdoor that allowed the KiwiSDR creator—and possibly others—to log in to their devices with administrative system rights. The remote admin could then make configuration changes and access data not just for the KiwiSDR, but in many cases to the Raspberry Pi, BeagleBone Black, or other computing device the SDR hardware is connected to.

A big trust problem

Signs of the backdoor in the KiwiSDR date back to at least 2017. The backdoor was recently removed under unclear circumstances. But despite the removal, users remain rattled, since the devices run as root on whatever computing device they’re connected to and can often access other devices on the same network.

Read 13 remaining paragraphs | Comments



https://ift.tt/3rpFdsd

Comments