Home  >  Article  >  Technology peripherals  >  Ecovacs responded to the exposure of product security vulnerabilities: the probability of being cracked in daily environments is extremely low, and security protection capabilities are being upgraded.

Ecovacs responded to the exposure of product security vulnerabilities: the probability of being cracked in daily environments is extremely low, and security protection capabilities are being upgraded.

WBOY
WBOYOriginal
2024-08-13 19:35:33762browse

According to news from this website on August 13, regarding the security vulnerabilities of its products, Ma Xianbin, public relations director of Ecovacs Greater China, responded to Sina Technology today and said: The attack paths and techniques of two experts, Dennis Giese and Braelynn, actually have many prerequisites. , it requires a lot of professional tools, close contact with the cracked machine, and even physical contact with the machine to crack and dismantle the machine to achieve such an effect. The security risks they pointed out have a very low probability of occurring in the user's daily use environment. , and even if the damage to user data privacy occurs, it will be very small.

Ecovacs responded to the exposure of product security vulnerabilities: the probability of being cracked in daily environments is extremely low, and security protection capabilities are being upgraded.


Refer to this site’s report on August 10, Dennis Giese and Braelynn demonstrated and reported on the development of Ecovacs sweeping robot and lawn mower products at the Def Con hacker conference loopholes. They believe the vulnerabilities remain unpatched and could be exploited by hackers.

Ecovacs responded to the exposure of product security vulnerabilities: the probability of being cracked in daily environments is extremely low, and security protection capabilities are being upgraded.

Ma Xianbin said: In Cobos’ view, this behavior of hackers is more of a scientific verification behavior, and we have quickly followed up on the firmware and technology of the vulnerabilities they have disclosed so far. Upgrade to block their possibility of cracking.

In Cobos’s view, the above two security personnel called the problem they discovered as a vulnerability, but in fact it is not a vulnerability, but more of a mechanism or a problem faced by the industry, because the entire industry has solutions In fact, everyone's safety is about the same.

Cobos believes that this is a cracking method in technical attack and defense, but it is an abnormal method in daily life. The company will use technical means such as restricting second account login and strengthening the secondary verification of Bluetooth device interconnection to strengthen the product's Security regarding Bluetooth connections.

"If they do not physically contact our product, or are not within a relatively close range of the product, it will not be able to do this kind of cracking."

In addition, Ma Xianbin also emphasized that the process methods developed by the two hackers are It is effective for a single device and is not replicable. Even if there are other people who want to do the same thing, they have to meet too many conditions and may not really be able to solve the problem.

The above is the detailed content of Ecovacs responded to the exposure of product security vulnerabilities: the probability of being cracked in daily environments is extremely low, and security protection capabilities are being upgraded.. For more information, please follow other related articles on the PHP Chinese website!

Statement:
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn