Ecovacs Responds to Security Vulnerability Claims, Says Hacker Behaviors Are Limited

TapTechNews August 13th news, in response to the security vulnerability of its products, Ma Xianbin, the public relations director of Ecovacs in the Greater China region, responded to Sina Technology today and said:

The attack paths and techniques of experts DennisGiese and Braelynn actually have many preconditions, require many professional tools, and need to be in close contact with the cracked machine, or even physically contact the machine to crack it and disassemble the machine to achieve such an effect. The security risks they pointed out have a very low probability of occurrence in the daily use environment of users, and even if it occurs, the damage to user data privacy is also very small.

Ecovacs Responds to Security Vulnerability Claims, Says Hacker Behaviors Are Limited_0

Refer to the TapTechNews report on August 10th, Dennis Giese and Braelynn demonstrated and reported the security vulnerability of Ecovacs sweeping robots and lawn mowers at the DefCon hacker conference. They believe that these vulnerabilities have not been fixed yet and may be exploited by hackers.

Ecovacs Responds to Security Vulnerability Claims, Says Hacker Behaviors Are Limited_1

Ma Xianbin said: In the opinion of Ecovacs, the behavior of hackers is more of a scientific verification behavior, and currently for these vulnerabilities they disclosed, we have quickly followed up and carried out firmware and technical upgrades to block the possibility of their cracking.

In the opinion of Ecovacs, the two security personnel called the problems they found vulnerabilities, but in fact this is not a vulnerability, but more of a mechanism or a problem faced by the industry as a whole, because the security of the solutions in the entire industry is actually more or less the same.

Ecovacs believes that this is a cracking method in the technical attack and defense, but it belongs to an abnormal method in daily life. The company will use technical means such as restricting the login of the second account and strengthening the secondary verification of the mutual connection of Bluetooth devices to strengthen the security of the product in terms of Bluetooth connection.

If they don't physically contact our product or are not within a relatively close range of this product, it is impossible to do such cracking.

In addition, Ma Xianbin also emphasized that the technological methods studied by the two hackers are only effective for a single device and do not have replicability. Even if there are other people who want to do the same thing, they have too many conditions to possess, and it may not really be able to crack this problem.

Related reading:

Ecovacs sweeping robot was exposed with security vulnerability and can monitor the owner using the camera and microphone

Likes