Issue 111: API vulnerabilities in AWS, Tesla Backup Gateway, Twitter 🦃

The Latest API Security News, Vulnerabilities and Best Practices
Issue: #111
API vulnerabilities in AWS, Tesla Backup Gateway, Twitter

Happy Thanksgiving to all of our readers in the US!

This week, we take a look at the recent API security issues with Resource-Based Policy APIs at Amazon Web Services (AWS), Backup Gateway APIs at Tesla, and in Twitter Fleets. In addition, we have some free passes to the upcoming DeveloperWeek New York that includes some talks on API security too.

Vulnerability: AWS Resource-Based Policy APIs
 

Researchers at Unit42 found that 22 APIs across 16 different AWS services can be exploited to leak Identity and Access Management (IAM) users and roles.

For improved user experience, AWS is trying to help users avoid mistakes when creating often complex resource-based policies and calls APIs to validate various fields present in the policy. One of these calls is to validate the AWS principal in the policy. See a couple of examples in the screenshots below:

While surely being helpful to the user, this also means that an attacker could use API calls to determine which identities (users and roles) exist for the account. To make matters worse, the messages on any failures appear in the attacker’s account logs. Nothing is logged in the target account, so victims do not even detect that they are under attack.

This is effectively a combination of OWASP issues API3:2019 — Excessive data exposure and API10:2019 — Insufficient logging and monitoring.

As an API provider, to avoid this kind of issue:

  • Be mindful of the balance between usability and data exposure, especially when designing your error messages. Sadly, security and being user-friendly are often hard to combine.
  • Make sure that logging and monitoring happens so that it can be used to detect attacks.

Unfortunately for AWS customers, the problem still persists. If you are one of them, here’s some advice from Unit42:

  • Remove inactive users and roles to reduce the attack surface.
  • Add random strings to usernames and role names to make them more difficult to guess.
  • Log in with identity provider and federation, so that no additional users are created in the AWS account.
  • Log and monitor all the identity authentication activities.
  • Enable two-factor authentication (2FA) for every user and IAM role.
Vulnerability: Tesla Backup Gateway APIs
 

Derek Abdine has looked into API security in Tesla Backup Gateways, which are part of the Powerwall and Powerpack systems. Gateways determine when to charge the batteries, when to send the power back to the power grid, and what combination of solar, battery, and grid energy to use to power the house.

The gateways are connected to the internet and expose API endpoints. These APIs are not officially published as part of Tesla’s documentation but have been discovered (unsurprisingly) and documented by the community.

Some of the APIs do not require authentication, and thus publicly expose data on the individual installation, such as energy consumption and production data, display name, country and state, name of the utility company, and so on. Even this seemingly innocent data can be used for nefarious purposes, such as timing burglary when the energy consumption is low, indicating an empty house.

The APIs that manage the system are quite sensitive because of the potential to damage the system itself and possibly even the grid to which these systems are connected. These APIs are secured, but the default credentials to these APIs are quite weak. The default password are the last five characters of the serial number. That serial number is printed on the device and so accessible to anyone in the neighborhood if it is installed outside. In fact, some counties publish households’ installation permits for Tesla Solar and Powerwall to the internet, making physical location of the systems public.

Even worse, the gateways also expose WiFi access points that always follow the same SSID naming pattern: TEG-XXX , where Xs are the last three characters of the serial number. These characters, also used in the default passwords, can be found in various WiFi SSID catalogs. This significantly reduces the scope of brute-force attacks to find out the default password from five to just two alphanumeric characters!

Read for full story for more details on the potential exposure. This can serve as another warning on the potential physical risks of API security in the world of IoT, and the dangers of non-random default passwords.

Vulnerability: Twitter Fleets
 

Twitter Fleets are the newly launched ephemeral media posts that are supposed to disappear after 24 hours.

However, a researcher found out that the APIs behind the feature allow access to older fleets.

Adding to the trouble, accessing fleets through API does not trigger read notifications — there is a separate API call to do that.

This is one of the typical examples of what happens when the user interface is viewed as the security boundary and the underlying API as mere implementation detail. APIs are very easy to discover these days, making it easy to circumvent the security on the UI.

Treat APIs as the security boundary and implement all your limits and security controls there!

Conference: DeveloperWeek New York
 

The silver lining of the pandemic is that it has forced all industry events to go virtual, making it possible to attend them without having to travel around the world, and DeveloperWeek New York on December 9—10, 2020 is no exception.

There’s a lot of good content, and I will be presenting a session on how to secure REST APIs if they are implemented as microservices in Kubernetes. My session “API Security in a Kubernetes World” is at 1:30 pm EST on December 9th.

If you need a free pass, you can get one from my speaker quota here. 😉

 
dmitry_apisec-1  

Dmitry Sotnikov

APIsecurity.io

 
Thanks for reading.

That's it for today. If you have any feedback or stories to share, simply reply to this email.

Please forward the newsletter to your friends and colleagues who might benefit from it.

 
42Crunch Ltd   71-75 Shelton Street  Covent Garden  London  Greater London   WC2H 9JQ   United Kingdom
You received this email because you are subscribed to API Security News from 42Crunch Ltd.

Update your email preferences to choose the types of emails you receive or Unsubscribe from all future emails  
 
 

Older messages

Issue 112: Vulnerability in Paginator, Microsoft RESTLer, talks on API authentication and JWT security 🗝️

Friday, December 4, 2020

Hi, today we look at a recent injection vulnerability, another API fuzzer, and 2 talks APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #112 Vulnerability in

Issue 110: API flaws in Bumble and COVID-KAYA, Forrester on API security, ASC 2020 talks 🖥️

Thursday, November 19, 2020

Hi, today we look at two recent API vulnerabilities, 2 session recordings, a webinar & APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #110 API flaws in

Issue 109: API token best practices, Dredd, IDOR hunting tips 🔬

Friday, November 13, 2020

Hi, this week we look at an API vulnerability leaking US voter data, API key best practices APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #109 API token best

Issue 108: API vulnerabilities in Thrillophilia and GitLab ✉️

Thursday, November 5, 2020

Hi, today we look at a couple recent API flaws, new OpenID Connect course, recent tool APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #108 API vulnerabilities in

Issue 107: Vulnerabilities in Waze, AWS, and NHS COVID-19 app, Forrester App Sec Tech Tide 🌊

Thursday, October 29, 2020

Hi, today we look into details of 3 recent API flaws, plus Forrester names API Security APIsecurity.io The Latest API Security News, Vulnerabilities and Best Practices Issue: #107 Vulnerabilities in

You Might Also Like

Dark forest, bad art and paying to bike

Saturday, December 28, 2024

Neologism #24, 28.12.2024 ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏ ͏

Weekend Reading — Happy New Year! 🥳

Saturday, December 28, 2024

Vitalis 🇺🇦 The most original and unusual landmark in Odesa, which has become a symbol of the creativity of Odesa residents. Tech Stuff Cursor I really really like Cursor. I had a great time using VS

Daily Coding Problem: Problem #1651 [Hard]

Saturday, December 28, 2024

Daily Coding Problem Good morning! Here's your coding interview problem for today. This problem was asked by Apple. You are going on a road trip, and would like to create a suitable music playlist.

📺 There's Still A Place for Universal Remotes — 10 Apps I Always Install on a New Mac

Saturday, December 28, 2024

Also: How to Add Emails to Your Tasks To-Do List in Gmail, and More! How-To Geek Logo December 28, 2024 Did You Know In December 2014, two con men from Girona, Spain, agreed to sell a fake Francisco de

Ranked | The World's Top 30 Countries, by Automobiles Manufactured 🚙

Saturday, December 28, 2024

In 2023, China led global car production, contributing nearly a third of total output. Which countries followed in this competitive industry? View Online | Subscribe | Download Our App FEATURED STORY

🐍 New Python tutorials on Real Python

Saturday, December 28, 2024

Hey there, There's always something going on over at Real Python as far as Python tutorials go. Here's what you may have missed this past week: Learn From 2024's Most Popular Python

15,000+ Four-Faith Routers Exposed to New Exploit Due to Default Credentials

Saturday, December 28, 2024

THN Daily Updates Newsletter cover Resilient Cybersecurity ($39.99 Value) FREE for a Limited Time Reconstruct your defense strategy in an evolving cyber world Download Now Sponsored LATEST NEWS Dec 28,

Hands Down One Of The Best Cards For 2025 Offering 0% interest until 2026

Saturday, December 28, 2024

iPhoneLife Logo Sponsored email sent by iPhone Life Hands Down One Of The Best Cards For 2025 Offering 0% interest until 2026 If you have outstanding credit card debt, getting a new 0% intro APR credit

📧 What Rewriting a 40-Year-Old Project Taught Me About Software Development

Saturday, December 28, 2024

​ What Rewriting a 40-Year-Old Project Taught Me About Software Development Read on: m​y website / Read time: 7 minutes The .NET Weekly is brought to you by: As the year wraps up, it's clear API

This Week in Rust #579

Saturday, December 28, 2024

Email isn't displaying correctly? Read this e-mail on the Web This Week in Rust issue 579 — 25 DEC 2024 Hello and welcome to another issue of This Week in Rust! Rust is a programming language