Cracking Cortana: The Dangers of Flawed Voice Assistants

  /     /     /  
Publicated : 22/11/2024   Category : security


Cracking Cortana: The Dangers of Flawed Voice Assistants


Researchers at Black Hat USA will show how vulnerabilities in Microsofts Cortana highlight the need to balance security with convenience.



Security vs. convenience is a delicate balance to strike with new technology designed to make our lives easier. Vulnerabilities in voice assistants like Microsofts Cortana and Amazons Alexa are perfect examples of how the rush to simplify can cause complicated problems down the road.
Consider Cortana, which is enabled by default in Windows 10. Cortana was built to facilitate vocal interaction with laptops, desktops, smartphones, and IoT devices running Microsofts newest OS, and its becoming more common in the enterprise as organizations deploy Windows 10 across their environments. The rollout is leaving holes in enterprise defense because Cortana, like other voice assistants, prioritizes users comfort over security.
Amichai Shulman, cofounder and CTO of Imperva, has spent the past year exploring the technology, infrastructure, and protocols of voice assistants with his colleague, security researcher Tal Beery. He says Cortana serves as a weak interface over the otherwise secure Windows operating system and has discovered multiple vulnerabilities to support this.
Cortana takes a stable environment, reasonably secured, and adds this new type of interface on top of it, Shulman explains. He and Beery will present their findings on Cortana flaws in August at Black Hat USA in a session entitled
Open Sesame: Picking Locks with Cortana
.
Want Data? All You Have to Do Is Ask
It didnt take long for the researchers to learn the default setting in Windows 10 lets anyone communicate with Cortana – even when the machine is locked. We started looking for methods to bypass the lock mechanism using voice, says Shulman.
They first found the Voice of Esau (VoE) exploit, which let attackers take over a locked Windows 10 device by combining voice commands with network manipulation to put a malicious payload on a target machine.
VoE was patched by Microsoft in August 2017; still, Shulman believed there were more vulnerabilities to be uncovered. He continued his research, testing concepts like vocal malware along with students at Technion, the Israel Institute of Technology. There are local and Internet-based extensions for Cortana; a whole set of protocols and APIs that can be attacked, he says.
One of the flaws they discovered, dubbed Open Sesame, will be the core focus of their Black Hat session. CVE-2018-8140 was recently
addressed
in Microsofts June Patch Tuesday update.
Open Sesame is more powerful than VoE, he says, and allows attackers to take over a locked Windows 10 machine and execute arbitrary code. Exploiting this vulnerability would let anyone view sensitive files, browse online, download and launch arbitrary executables from the Internet, and in some cases gain elevated privileges. A threat actor wouldnt need external code to pull this off, so antivirus and IPS tools wouldnt pick up on the attack.
There are a number of scenarios where close proximity attacks are being used – computers in hotel rooms, airport security attacks … just give your locked computer to someone to inspect and in a matter of seconds that computer can be compromised, Shulman explains.
A Conversation on Convenience
The reason behind these vulnerabilities is twofold, Shulman says. For starters, Microsoft tried to pitch a new interface, built on accessibility and comfort, onto a secured multi-purpose computing environment. When you do that, there are glitches, he points out.
It is beneficial to have some commands available on a locked machine. Asking about the weather, for example, is benign. However, its tricky to enable certain functionalities while denying operations that could potentially compromise the machine.
The second problem: Microsofts assistant is more than a voice interface. Shulman calls it an intent resolution engine. Cortana takes natural language input and conveys it into an action performed by the machine. However, it accepts both written and spoken commands. Once the system is invoked with Hey Cortana, an attacker can enter keyboard input and execute code on a locked device.
As part of their discussion, Shulman and Beery will address defense mechanisms for protecting against these types of attacks. One lesson, at least for enterprise environments, is to make sure the enhanced interface is off by default. Vendors dont like to launch new services and not have them active by default, Shulman says, but in the workplace its the prudent thing to do.
The team will demonstrate the Open Sesame vulnerability at Black Hat There are three more Cortana vulnerabilities Shulman hopes to discuss in their presentation but they are waiting on confirmation before they can publicly share more details.
Related Content:
7 Places Where Privacy and Security Collide
Microsoft Office: The Go-To Platform for Zero-Day Exploits
Most Websites and Web Apps No Match for Attack Barrage
Hidden Tunnels Help Hackers Launch Financial Services Attacks
Why Cybercriminals Attack: A DARK READING VIRTUAL EVENT Wednesday, June 27. Industry experts will offer a range of information and insight on who the bad guys are – and why they might be targeting your enterprise. Go
here
 for more information on this free event.
 

Last News

▸ 7 arrested, 3 more charged in StubHub cyber fraud ring. ◂
Discovered: 23/12/2024
Category: security

▸ Nigerian scammers now turning into mediocre malware pushers. ◂
Discovered: 23/12/2024
Category: security

▸ Beware EMV may not fully protect against skilled thieves. ◂
Discovered: 23/12/2024
Category: security


Cyber Security Categories
Google Dorks Database
Exploits Vulnerability
Exploit Shellcodes

CVE List
Tools/Apps
News/Aarticles

Phishing Database
Deepfake Detection
Trends/Statistics & Live Infos



Tags:
Cracking Cortana: The Dangers of Flawed Voice Assistants