Nytro Posted December 10, 2014 Report Posted December 10, 2014 Keurig 2.0 Genuine K-Cup Spoofing Vulnerability From: Kenneth Buckler <kenneth.buckler () gmail com>Date: Tue, 9 Dec 2014 13:04:20 -0500*Overview*Keurig 2.0 Coffee Maker contains a vulnerability in which the authenticityof coffee pods, known as K-Cups, uses weak verification methods, which aresubject to a spoofing attack through re-use of a previously verified K-Cup.*Impact*CVSS Base Score: 4.9Impact Subscore: 6.9Exploitability Subscore: 3.9Access Vector: LocalAccess Complexity: LowAuthentication: NoneConfidentiality Impact: NoneIntegrity Impact: CompleteAvailability Impact: None*Vulnerable Versions*Keurig 2.0 Coffee Maker*Technical Details*Keurig 2.0 is designed to only use genuine Keurig approved coffee K-Cups.However, a flaw in the verification method allows an attacker to useunauthorized K-Cups. The Keurig 2.0 does verify that the K-Cup foil lidused for verification is not re-used.Step 1: Attacker uses a genuine K-Cup in the Keurig machine to brew coffeeor hot chocolate.Step 2: After brewing is complete, attacker removes the genuine K-Cup fromthe Keurig and uses a knife or scissors to carefully remove the full foillid from the K-Cup, ensuring to keep the full edges intact. Attacker keepsthis for use in the attack.Step 3: Attacker inserts a non-genuine K-Cup in the Keurig, and closes thelid. Attacker should receive an "oops" error message stating that the K-Cupis not genuine.Step 4: Attacker opens the Keurig, leaving the non-genuine K-Cup in theKeurig, and carefully places the previously saved genuine K-Cup lid on topof the non-genuine K-Cup, lining up the puncture hole to keep the lid inplace.Step 5: Attacker closes the Keurig, and is able to brew coffee using thenon-genuine K-Cup.Since no fix is currently available, owners of Keurig 2.0 systems may wishto take additional steps to secure the device, such as keeping the devicein a locked cabinet, or using a cable lock to prevent the device from beingplugged in when not being used by an authorized user.Please note that a proof of concept is already available online.*Credit: *Proof of concept at KeurigHack.comVulnerability Writeup by Ken Buckler, Caffeine SecurityCaffeine SecurityVideo: Sursa: Full Disclosure: Keurig 2.0 Genuine K-Cup Spoofing Vulnerability Quote