A backdoor that allows voyeurism and eavesdropping is discovered in a smartwatch for children made in China
backdoor on the Xplora X4 children's smartwatch sold by Norwegian Xplora that allows you to remotely control the camera to take pictures and intercept voice calls. The Xplora X4 is believed to have been developed and manufactured by the Qihoo 360 Group in China for hardware and applications.
We found a
Exposing covert surveillance backdoors in children's smartwatches | mnemonic
Undocumented backdoor that covertly takes snapshots found in kids' smartwatch | Ars Technica
Xplora X4 is a smartwatch that supports 4G, 3G, and 2G connections and can operate independently with Android. In addition to taking pictures with a 2-megapixel camera and making voice and video calls, it also has a location information sharing function for parents to watch over their children because it supports GPS.
X4 – Xplora
In this Xplora X4, we found a backdoor that can forcibly acquire real-time location information, photos, sounds, etc. from a remote location. According to Harrison Sand and Erlend Leiknes of Norwegian security firm mnemonic, Xplore X4 is activated by sending an encrypted text message, 'REMOTE_SNAPSHOT (remote snapshot)' and 'SEND_SMS_LOCATION (send location by SMS)'. ) ”Can be executed. Sand et al. Reported that by running 'REMOTE_SNAPSHOT', they confirmed that the photo was taken immediately and automatically sent to Xplora's server while the display was off.
From this, Sand et al. Believe that the Xplora X4 in question was developed and manufactured by Qihoo 360 in China, and that Xplora is responsible for sales outside China. Qihoo 360 is a company that was added to the United States Department of Commerce's export sanctions list in June 2020 because it 'contrary to US security interests.'
According to Sand, the phone number assigned to the Xplora X4 and the per-device encryption key are required to execute commands from the backdoor. An Xplora spokeswoman said, 'At least the phone number cannot be known by Xplora.' 'Even if an attacker pokes the backdoor in question and forcibly takes a picture, the data will be accessible to a third party. In addition to being saved on the AWS server that cannot be done, all logs are saved when an employee accesses the server. ' Regarding the existence of the backdoor in question, he said, 'It is a remnant of the remote photography function that was planned to be implemented in the'SOS emergency button'for children, and it was not completely removed from the firmware.'