AVERAGE
UNCOMMON
AVERAGE
MODERATE
- Determining if insecure network services exist by reviewing your device for open ports using a port scanner
- As open ports are identified, each can be tested using any number of automated tools that look for DoS vulnerabilities, vulnerabilities related to UDP services and vulnerabilities related to buffer overflow and fuzzing attacks
- Reviewing network ports to ensure they are absolutely necessary and if there are any ports being exposed to the internet using UPnP.
- Ensuring only necessary ports are exposed and available.
- Ensuring services are not vulnerable to buffer overflow and fuzzing attacks.
- Ensuring services are not vulnerable to DoS attacks which can affect the device itself or other devices and/or users on the local network or other networks.
- Ensuring network ports or services are not exposed to the internet via UPnP for example
Please review the following OWASP tabs for more detail based on whether you are a Manufacturer, Developer or Consumer
Scenario #2: Ports open to the internet possibly without the user’s knowledge via UPnP.
In the cases above, the attacker is able to disable the device completely with an HTTP GET or access the device via the internet over port 80 and/or port 443.
More From The Internet of Things Top 10

