This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Google Glass flaw would have allowed third party control

Share this article:
Google Glass flaw would have allowed third party control
Google Glass flaw would have allowed third party control

Attackers could have taken full remote control of Google Glass via a now patched vulnerability.

The attack would require a Glass user to scan a QR code that would force them onto an attacker-controlled wireless network. It may also have given an attacker a first person view of the wearer of the glasses

Lookout Mobile researchers reported the flaw to Google on 15th May and it was patched on the 4th June for the 10,000 users of Glass.

Google limited QR code execution points where the user has solicited it, Lookout researcher Marc Rogers said. The fast response from Google, Rogers said, set a "benchmark for how connected things should be secured going forward".

In Rogers' scenario demonstration video, a victim scanned a QR code at a bus stop and was pushed onto a network that was broadcast from an attacker's WiFi Pineapple.

The attacker was pushed to a custom page containing a known Android 4.0.4 web vulnerability to Glass allowing for remote control over the internet.

"When photographed by an unsuspecting Glass user, the code forced Glass to connect silently to a hostile WiFi access point that we controlled. That access point in turn allowed us to spy on the connections Glass made, from web requests to images uploaded to the cloud," Rogers said.

"Both the vulnerability and its method of delivery are unique to Glass as a consequence of it becoming a connected thing."

Share this article:

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more

More in News

StubHub ticketing agency taken for a million pounds

StubHub ticketing agency taken for a million pounds

Police around the world have arrested seven people - thought to have been tied into an international fraud ring - that allegedly defrauded the eBay-owned StubHub online ticketing service of ...

DDoS attacks grow as first DIY kits emerge

DDoS attacks grow as first DIY kits emerge

The latest report from Akamai Technologies has revealed another increase in DDoS attacks and the resurgence of botnets to carry out server-based attacks.

WordPress plugin flaw opens blogs up to cybercriminals

WordPress plugin flaw opens blogs up to cybercriminals

A WordPress plugin called MailPoet - which has been downloaded around 1.7 million times - has placed large numbers of WordPress-based websites at risk of incursion.