CVE-2024-12078

6.3 MEDIUM

📋 TL;DR

ECOVACS robot lawn mowers and vacuums use a static, shared secret key to encrypt Bluetooth Low Energy (BLE) GATT messages, allowing unauthenticated attackers within BLE range to control any robot using the same key. This affects all ECOVACS robot models that rely on this flawed BLE authentication mechanism.

💻 Affected Systems

Products:
  • ECOVACS robot lawn mowers
  • ECOVACS robot vacuums
Versions: All versions using the static BLE key authentication mechanism
Operating Systems: Embedded robot firmware
Default Config Vulnerable: ⚠️ Yes
Notes: All devices using the vulnerable BLE authentication scheme are affected regardless of configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could remotely control robots to cause physical damage, steal the device, or use it as an entry point into the local network if the robot has network connectivity.

🟠

Likely Case

Attackers within BLE range (typically up to 100 meters) could start/stop robots, change settings, or disrupt cleaning/mowing operations as a prank or nuisance attack.

🟢

If Mitigated

With proper network segmentation and physical security controls, impact is limited to local disruption of robot functions without broader network compromise.

🌐 Internet-Facing: LOW - The vulnerability requires physical proximity via BLE, not internet connectivity.
🏢 Internal Only: MEDIUM - Requires attacker to be within BLE range, but many homes/businesses have robots in accessible areas.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation demonstrated at 37C3 conference with proof-of-concept tools available. Attack requires BLE sniffing/capture tools and knowledge of the static key.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None known

Restart Required: No

Instructions:

No official patch available. Contact ECOVACS support for firmware update information.

🔧 Temporary Workarounds

Disable BLE when not in use

all

Turn off Bluetooth connectivity on the robot when not actively controlling it via the app

Use ECOVACS app settings to disable Bluetooth connectivity

Physical security controls

all

Restrict physical access to areas where robots operate to prevent attackers from getting within BLE range

🧯 If You Can't Patch

  • Segment robot network from critical systems if robot has WiFi connectivity
  • Monitor for unauthorized BLE connections using Bluetooth scanning tools

🔍 How to Verify

Check if Vulnerable:

Use BLE scanning tools to check if robot responds to commands encrypted with the known static key

Check Version:

Check firmware version in ECOVACS mobile app under device settings

Verify Fix Applied:

Check if robot firmware has been updated to use unique per-device keys or proper authentication

📡 Detection & Monitoring

Log Indicators:

  • Unexpected robot activation/deactivation
  • Settings changes not initiated by authorized user

Network Indicators:

  • Unusual BLE traffic patterns to robot MAC address
  • Multiple failed authentication attempts via BLE

SIEM Query:

Not applicable - primarily physical/Bluetooth based attack

🔗 References

📤 Share & Export