Personal weather stations can expose your Wi-Fi network

Netatmo weather stations upload Wi-Fi passwords and SSIDs to the company's servers over insecure connections

In the latest Internet of Things security blunder, personal weather station devices made by Netatmo were found sending users' Wi-Fi passwords back to the company over unencrypted connections.

Netatmo weather stations can be used to monitor indoor and outdoor temperature, humidity, carbon dioxide levels and overall air quality. Users can see the data collected by their stations in real-time through an app installed on their phones, tablets or computers.

The public weather map on Netatmo's website shows that thousands of such devices are installed around the world.

When the weather stations are first configured, users need to give them access to their Wi-Fi networks, so they can transmit sensor readings to the Netatmo cloud over the Internet.

The problem is that the devices also send the wireless network identifier (SSID) and the password to the company's servers and do so over an unencrypted connection, said Johannes Ullrich, CTO of the SANS Internet Storm Center, in a blog post Thursday.

Ullrich discovered the issue after monitoring data traffic from his own Netatmo weather station.

"Not only should data like this not be transmitted 'in the clear,' but in addition, there is no need for Netatmo to know the WPA password for my network," Ullrich said.

Ullrich said that he reported the problem to the company, which blamed the behavior on a debugging feature that collects the contents of the device's memory on first run.

According to Ullrich, the company expressed its intention to remove this feature "very soon" and this week it released a firmware update that appears to fix the issue. In an update to his blog post on Friday he said he is still trying to verify if that is the case.

Netatmo did not immediately respond to a request for comment.

This issue adds to a growing list of basic security lapses discovered in smart home devices and other Internet-connected appliances that have invaded the consumer electronics market in the last few years.

Security experts have repeatedly expressed their concern that device manufacturers pay little attention to basic security principles in their rush to put Internet connectivity into everything.

The security mess has given birth to Internet of Things security advisory groups like BuildItSecure.ly and I Am the Cavalry.

Join the CSO newsletter!

Error: Please check your email address.

Tags intrusionSANS InstitutesecurityNetatmoAccess control and authenticationprivacy

More about

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

  • 150x50

    IDG Live Webinar:The right collaboration strategy will help your business take flight

    Speakers - Mike Harris, Engineering Services Manager, Jetstar - Christopher Johnson, IT Director APAC, 20th Century Fox - Brent Maxwell, Director of Information Systems, THE ICONIC - IDG MC/Moderator Anthony Caruana

    Play Video

More videos

Blog Posts

Market Place