1. Vulnerabilities in IoT devices, backends, applications, and components
- Author
-
Kaksonen, R. (Rauli), Halunen, K. (Kimmo), Röning, J. (Juha), Kaksonen, R. (Rauli), Halunen, K. (Kimmo), and Röning, J. (Juha)
- Abstract
The Internet of Things (IoT) is the ecosystem of networked devices encountered in both work and home. IoT security is a great concern and vulnerabilities are reported daily. IoT is mixed into other digital infrastructure both in terms of sharing the same networks and using the same software components. In this paper, we analyze Common Vulnerabilities and Exposures (CVE) entries, including known exploited vulnerabilities, to describe the vulnerabilities in the IoT context. The results indicate that 88% of reported vulnerabilities are relevant to IoT systems. Half of the vulnerabilities are in the backend or frontend systems while 10‐20% concern the IoT devices. HTTP servers are the vulnerability hotspots wherever they are located. Software components are used in all IoT subsystems and tracking and updating them is essential for system security. The results can be used to understand where and what kind of vulnerabilities are in IoT systems.
- Published
- 2023