SHARE
Facebook X Pinterest WhatsApp

Major Security Vulnerability Found in Yet Another Consumer IoT Device

thumbnail
Major Security Vulnerability Found in Yet Another Consumer IoT Device

Man touching IoT (internet of things) network on display

Researchers at Bitdefender discovered a security flaw that involved the devices sending hackers the passwords of the WiFi networks they were connected to.

Written By
thumbnail
Sue Walsh
Sue Walsh
Nov 19, 2019

In a recent case study, cybersecurity research company Bitdefender revealed a serious security flaw in the popular Amazon Ring doorbell. When users configure the doorbell for a WiFi network, it creates an access point to that network that doesn’t require a password. Hackers can trick the device into malfunctioning, prompting the owner to reconfigure it and granting the hacker access to the network to launch a larger attack.

Bitdefender said it made Amazon aware of the issue and a spokesperson for Ring said the security hole has been closed and urged owners to make sure their devices have updated firmware.

See also: IoT Security Remains a Top Concern

Configuring for Safety

“When first configuring the device, the smartphone app must send the wireless network credentials. This takes place in an unsecured manner, through an unprotected access point,” says Bitdefender. “Once this network is up, the app connects to it automatically, queries the device, then sends the credentials to the local network.”

“Customer trust is important to us and we take the security of our devices seriously. We rolled out an automatic security update addressing the issue, and it’s since been patched,” the spokesperson says.

Earlier this year, Amazon released a firmware update to fix a security flaw that could have allowed hackers to access the doorbell’s audio and video.

The Amazon Ring doorbell has received other criticisms for privacy issues before, namely for its partnerships with police departments. 

thumbnail
Sue Walsh

Sue Walsh is News Writer for RTInsights, and a freelance writer and social media manager living in New York City. Her specialties include tech, security and e-commerce. You can follow her on Twitter at @girlfridaygeek.

Recommended for you...

New Frontiers of IAM: Reaching Great Heights with 2024 Trends
Ronak D. Jain
May 22, 2024
Application Security for IoT: 10 Best Practices
Sagar Nangare
Feb 21, 2023
The Importance of Ensuring IoT System Security
Is Nanotechnology Ready to Enter the IoT Security War?
Bernard Brode
Apr 12, 2022

Featured Resources from Cloud Data Insights

The Difficult Reality of Implementing Zero Trust Networking
Misbah Rehman
Jan 6, 2026
Cloud Evolution 2026: Strategic Imperatives for Chief Data Officers
Why Network Services Need Automation
The Shared Responsibility Model and Its Impact on Your Security Posture
RT Insights Logo

Analysis and market insights on real-time analytics including Big Data, the IoT, and cognitive computing. Business use cases and technologies are discussed.

Property of TechnologyAdvice. © 2026 TechnologyAdvice. All Rights Reserved

Advertiser Disclosure: Some of the products that appear on this site are from companies from which TechnologyAdvice receives compensation. This compensation may impact how and where products appear on this site including, for example, the order in which they appear. TechnologyAdvice does not include all companies or all types of products available in the marketplace.