- Date Discovered:
- 08 May 2018
- Multiple Microsoft Azure IoT SDKs are prone to a security vulnerability that may allow attackers to conduct spoofing attacks. A man-in-the-middle attacker can exploit this issue to conduct spoofing attacks and perform unauthorized actions; other attacks are also possible.
- Microsoft C SDK for Azure IoT
- Microsoft C# SDK for Azure IoT
- Microsoft Java SDK for Azure IoT
Block external access at the network boundary, unless external parties require service.Filter access to the affected computer at the network boundary if global access isn't required. Restricting access to only trusted computers and networks might greatly reduce the likelihood of a successful exploit
Deploy network intrusion detection systems to monitor network traffic for malicious activity.Deploy NIDS to monitor network traffic for signs of anomalous or suspicious activity. This includes but is not limited to unexplained incoming and outgoing traffic. This may indicate exploit attempts or activity that results from successful exploits.
Cristian Pop, Rajeev Vokkarne, John Spaith, and Tim Taylor of Azure IoT