In a twist that reads like a tech startup pitch, and a cybersecurity thriller, two UC Santa Cruz students, Alexander Sherbrooke and Iakov Tarenenko, discovered a serious security flaw in CSC Service Works IoT laundry machines. By reverse engineering the mobile apps API, they exposed a loophole that allowed them to run machines without paying and even top up their laundry accounts with multi-million dollar balances.
What's striking and alarming, is how easily they could have been exploited beyond a harmless prank. Since CSC servers blindly trusted commands purportedly sent by the app, the students were able to directly manipulate machine behavior. While a physical button still needed to be pressed for a cycle to start, the vulnerability exposed the lack of backend checks and raised serious concerns about connected, heavy duty appliances operating via the internet.
This bug shines a light on the often overlooked risks of IoT devices, especially everyday items like washing machines. It underscores the importance of ethical disclosures, responsiveness from vendors, and robust security design. Thankfully, after the vulnerability went public, CSC finally acknowledged the issue and began patches, showing how transparency and prompt actions are vital in keeping us all safer.
By: Joshua Xiong
Sources: https://www.theverge.com/2024/5/19/24160383/students-security-bug-laundry-machines-csc-serviceworks