Security Flaw Discovered In Peloton Equipment

The vulnerability could give attackers remote root access to the bike's tablet, researchers report.

A vulnerability in the Peloton Bike+ could have allowed an attacker to remotely spy on users, McAfee's Advanced Threat Research (ATR) team found.

The bug, which has already been addressed through a mandatory patch issued to affected devices worldwide, could have given an attacker remote root access to the Peloton tablet. Researchers note a threat actor would have required physical access to the equipment in order to take advantage of the flaw. 

"The hacker could install malicious software, intercept traffic and user's personal data, and even gain control of the Bike's camera and microphone over the internet," McAfee wrote in a blog post on the discovery. 

This flaw was found in the Android Verified Boot (AVB) process. It could be exploited, for example, on Peloton equipment in a gym or a hotel and then used to spy on riders or harvest user credentials, McAfee researchers explained. 

The security firm says Peloton confirmed the vulnerability is also present on Peloton Tread exercise equipment. McAfee informed Peloton about the vulnerability in March and the patch was tested and confirmed earlier this month.

McAfee says the discovery is a reminder to consumers that IoT fitness equipment and devices require the same level of security as any connected device, like a computer or a smartphone.

The report from McAfee can be read here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Email This  | 
Print  | 
More Insights
Webcasts
Disaster Recovery/Business Continuity in the New Normal
Threat Deception: Tricking Attackers for Fun and Defense
More Webcasts
White Papers
Ransomware Security Breach Summary: Food Production
The State of Endpoint Security
More White Papers
Reports
Tech Insights: Detecting and Preventing Insider Data Leaks
Improving Security by Moving Beyond VPN
More Reports