Toilets next target for hackers

Security researchers find flaw that allows for hijacking of 'smart toilet'

Tags: BluetoothTrustwave Holdings Inc (www.trustwave.com)
  • E-Mail
Toilets next target for hackers Smart toilets at risk from Bluetooth vulnerability.
By  Mark Sutton Published  August 6, 2013

Toilets could be the next target for hackers, according to a research report from Trustwave's SpiderLabs security team.

The team have detected a flaw in the hardware of Satis ‘smart' toilets produced by Japanese company LIXIL, which makes them vulnerable to unauthorised access to the toilet controls.

The toilet can be controlled using a Google application, also produced by LIXIL, which links to the toilet via Bluetooth. The ‘My Satis' Android application has a hard-coded Bluetooth PIN of 0000, meaning that any mobile with the application installed can be used to control any Satis toilet.

While the hack would be limited to the range of the Bluetooth, an attacker could potentially catch a user with an unexpected flush, a blast of hot air or water from the bidet function, or shut the lid without warning.

No patch is available for the vulnerability at present.

Add a Comment

Your display name This field is mandatory

Your e-mail address This field is mandatory (Your e-mail address won't be published)

Security code