Given the severe risk posed by security weaknesses in IoT systems to IoT services and other services in society, including the possibility of causing the loss of human lives or disrupting society, it is crucial to identify and address IoT security vulnerabilities before cybercriminals can exploit them. The proliferation of diverse IoT devices across various sectors in society with very little or no standardisation and regulation has increased IoT vulnerabilities and attack surfaces that cybercriminals can leverage to compromise the data collected using IoT devices and to compromise existing systems. Some of the IoT security vulnerabilities include the following (figure 1):
Embedding of passwords on the IoT devices: To facilitate remote technical support, IoT engineers and developers must remotely access the devices for configuration during deployments and troubleshooting during the operations and maintenance of IoT networks with many devices. This makes it easy for cybercriminals to access and exploit IoT devices for malicious purposes.
Lack of authentication: Sometimes, some IoT manufacturers ship devices without incorporating any authentication mechanism, making the devices vulnerable to unauthorised access by malicious attackers, which violates the confidentiality, privacy, and integrity of IoT data. They may also take over the devices and use them for malicious purposes. Thus, devices without any form of authentication are rugged devices that can be used as an attack surface to conduct advanced attacks on IoT systems and other critical resources.
Weak passwords: To make their devices easy to use, device manufacturers ship devices with default security such as hardcoded passwords, which users cannot change, default usernames and passwords, or provide a simple way of logging into the device. Since the manufacturer's security credentials are easy and never changed, attackers usually exploit them to gain access to the device, compromising the confidentiality and integrity of the data. They can use the devices for further attacks.
Backdoors: Most IoT manufacturers create hidden access mechanisms called back doors (user-id/password or open ports) to permit them to support the devices. Attackers often access these back doors and then exploit them to launch attacks (e.g., botnets and other malware attacks).
Failure to install security patches and updates: Some IoT manufacturers do not provide a simple and effective way to install security patches and updates, making it difficult for IoT service providers to resolve security vulnerabilities before cybercriminals can exploit them. Unlike traditional computer systems with mechanisms for continuous installation of security updates and notification of security changes due to updates, IoT devices are straightforward and lack these features, making them vulnerable to cyberattacks. Also, due to their simple nature, IoT devices are vulnerable to attacks such as unauthorised software and firmware updates. IoT manufacturers do not even release patches or updates of the software on their devices, and attackers exploit them. And even if patches and updates are released, users have difficulties adding them to the device, and most of the vulnerabilities in these devices are never patched
Poorly protected network services: The wireless communication channel between the IoT device and the access point or gateway is a significant attack surface often used to attack IoT devices. Unencrypted communication channels are one of the network vulnerabilities due to unprotected network services. Because of the energy, cost and processing power constraints, most IoT manufacturers do not implement cryptographic mechanisms to ensure secure communication. This makes it easier for attackers to launch man-in-the-middle attacks on IoT networks. Confidential data, including authentication credentials, can be compromised and used to launch further attacks, such as DoS/DDoS attacks, without protecting the communication between the IoT devices and the servers. Also, there are some unnecessary services, such as unprotected ports, that cybercriminals can exploit. Failure to disable unused ports or protect used ports with a firewall leaves them vulnerable to cybersecurity attacks.
Internet exposure: Some IoT devices are connected directly to the internet without firewalls or any form of security mechanism and are likely to be attacked.
Unprotected interfaces: Some vulnerabilities in IoT systems can be introduced by poorly secure or unprotected interfaces (e.g., web, backend APIs, cloud, fog interfaces), which make IoT devices and other resources vulnerable to cyberattacks. Weak (and sometimes lack of) authentication/authorisation and cryptographic mechanisms make the communication through these interfaces vulnerable to cyberattacks as there is access control to essential resources, lack of accountability, and protection of data and systems from being compromised.
Use of outdated components: Sometimes, IoT device manufacturers cannot resolve hardware or software security vulnerabilities discovered in IoT devices, forcing IoT service providers to keep using the devices without any security improvements to address the known vulnerabilities. These outdated devices with well-known security vulnerabilities become sweet pots for cybercriminals to exploit, compromise, and damage IoT systems and resources.
Supply chain vulnerabilities: The IoT supply chain consists of manufacturers (manufacturers of semiconductor chips, hardware parts, IoT devices, software), distributors, vendors, service providers, and users. Vulnerabilities may be introduced into the IoT devices at any stage of the supply chain. It could be a piece of compromised software or hardware manipulated or installed to introduce security weaknesses that make IoT devices vulnerable to IoT attacks or easy to compromise. The objective of supply chain attacks could be cyberespionage (data theft or compromise) and exploiting the devices to launch sophisticated cyberattacks. Poorly designed third-party software (such as libraries, drivers, kernels or hardware components) installed on the devices or part of other applications or firmware may introduce vulnerabilities that may eventually be exploited to compromise the devices or use them for further attacks on infrastructures. One of the sources of supply chain vulnerabilities is the use of third-party software and hardware components without adequately checking for security vulnerabilities and resolving them before incorporating the components into IoT products. In some instances, IoT device developers sometimes copy codes from online sources and add them to their programs for IoT devices to get the desired functionalities of the device running. Another form of supply chain vulnerability is implementing very little or no security mechanism on IoT devices by device manufacturers or developers (when deploying the device), making them vulnerable to attacks. One of the significant challenges of supply chain attacks is that the users are unaware of these weaknesses and how many devices in their infrastructure from different manufacturers possess such vulnerabilities.
Outdated firmware: After IoT devices are deployed, some IoT service providers do not update the firmware or software running on the devices for a long time. Some do not update at all, leaving them with vulnerabilities that may be exploited.
Poor device management strategies and policies: Some IoT devices are deployed without unique identifiers to enable the tracking, monitoring, and management of IoT devices. As a result, some IoT nodes sit on the infrastructure without being adequately monitored and managed to ensure any vulnerability can be identified and resolved. If the cybersecurity department is unaware of some IoT nodes' presence, they cannot protect them, leaving them vulnerable to attacks. Some IT administrators neglect IoT nodes without giving them the same security efforts they do for traditional computing and networking nodes and do not list them on the inventory of assets that need to be protected; thus, the devices are rarely updated and maintained to ensure that they cannot be compromised or exploited.
Poor security key management protocols: If the cryptographic keys are compromised, the IoT devices become vulnerable to man-in-the-middle attacks and other attacks that could disrupt the IoT service or compromise the IoT data.
Poor physical hardening of the IoT devices: The fact that IoT nodes are often deployed in outdoor or remote environments makes them physically accessible to criminals who could compromise them. A criminal could either physically damage the device, extract information, or manipulate it so that it cannot perform its normal functions. For example, an attack may copy the data stored in the device's memory and may even replace some components with compromised ones, which could give them remote access to the devices.
Data management vulnerabilities: For large-scale IoT deployments with thousands, tens of thousands or hundreds of thousands of IoT nodes, the sheer volume of IoT data collected is so huge that traditional data management systems may be unable to handle them securely. That is, the confidentiality and integrity of the data may be compromised due to data storage, processing, and retrieval vulnerabilities in data management systems, which get worse with the scalability of IoT assets.
Vulnerabilities standardisation: Although there are many efforts to ensure proper standardisation in the IoT ecosystem, there are standardisation and interoperability issues. Designing an integrated security system to protect IoT devices from different manufacturers with diverse vulnerabilities is challenging. The diversity of IoT devices from various manufacturers makes integrating IoT devices into existing security frameworks difficult, resulting in weak IoT security or security being taken for granted, leaving the devices vulnerable to attacks.