Fortify - Application Security
Recent statistics show that almost half of breaches that cause material damage occur via applications. HP Fortify provides software and services that help organization secure applications to prevent those attacks. This blog serves as a platform for our penetration testers, product managers and marketers, and software engineers to provide analysis and insight regarding both web application security and how organizations can utilize our products and services to better secure their applications. For more information, visit

HP Study Reveals 70 Percent of Internet of Things Devices Vulnerable to Attack

Screen Shot 2014-07-28 at 8.21.58 PM.png


HP Fortify on Demand is pleased to announce the release of its Internet of Things State of the Union Study, revealing 70 percent of the most commonly used Internet of Things (IoT) devices contain serious vulnerabilities.


Why we did the study

Late last year, we were hearing a lot about Internet of Things, and a bit about IoT security, but had not seen anything that focused on the complete picture of IoT security, i.e. all the various surface areas that represent the IoT ecosystem. So, we decided to start the OWASP Internet of Things Top 10 Project, which aims to educate on the main facets of Internet of Things Security that people should be concerned with.


Then earlier this year, we decided to use that project as a baseline for testing the top 10 IoT devices being used today. We bought them, shipped them to Craig Smith's home lab, and beat up on them for around three weeks.


What we found 

On average, 25 vulnerabilities were found per device, totaling 250 vulnerabilities. Highlights include:

  • Privacy concerns
  • Insufficient authorization
  • Lack of transport encryption
  • Insecure web interface
  • Inadequate software protection 

(full details here)



We have a number of things we'd like people to take from the report:

  1. Internet of Things security is not one-dimensional. You need to look at all the surface areas discussed in the report and in the OWASP Internet of Things Top 10 Project in order to have a complete view of your risk.
  2. IoT Security is not just a consumer problem. Corporations need to be looking at how their ICS and SCADA systems fare when looked at under a similar light.
  3. The current state of Internet of Things security seems to take all the vulnerabilities from existing spaces, e.g. network security, application security, mobile security, and Internet-connected devices, and combine them into a new (even more insecure) space, which is troubling.

We hope that this study will help consumers, SMBs, corporations, and manufacturers to gain some level of improved understanding of their risk related to Internet of Things security, and to place some focus on the issues highlighted in the report when making decisions in the future.


 A special thanks to Craig Smith on the Fortify on Demand Research Team for spearheading the testing efforts!



:: The Full IoT State of the Union Study


Ping us with any thoughts, questions, or comments.


 : :

Daniel Miessler is a Practice Principal with Fortify on Demand based out of San Francisco, California. His areas of expertise are web and mobile application security testing and building application security programs for the Global and Fortune 100. He can be reached on Twitter at @danielmiessler

About HP Fortify on Demand 

HP Fortify on Demand is a cloud-based application security solution. We perform multiple types of manual and automated security testing, including web assessments, mobile application assessments, thick client testing, ERP testing, etc.--and we do it both statically and dynamically, both in the cloud and on-premise.

Labels: Fortify
MobilePundits | ‎12-22-2014 11:21 PM

I am amazed that in this day and age we are still getting pawned by buffer overflow attacks. I have recently read an article about Android vulnerabilities on Ars that describes a real-world problem. It's always some obscure research lab that has invented some implausible situation. Well, thanks for awaring us from this internet of things application vulnerabilities.

regul8or | ‎02-10-2015 03:03 AM

Interesting find. I just have a conversation with our SCADA contractor about their system security, which is not exist.


Unfortunately the link appears to be broken. Would be very helpful to have ab access to the report.



danielmiessler | ‎03-05-2015 04:30 PM
Leave a Comment

We encourage you to share your comments on this post. Comments are moderated and will be reviewed
and posted as promptly as possible during regular business hours

To ensure your comment is published, be sure to follow the Community Guidelines.

Be sure to enter a unique name. You can't reuse a name that's already in use.
Be sure to enter a unique email address. You can't reuse an email address that's already in use.
Type the characters you see in the picture above.Type the words you hear.
Showing results for 
Search instead for 
Do you mean 
About the Author

Follow Us
The opinions expressed above are the personal opinions of the authors, not of HP. By using this site, you accept the Terms of Use and Rules of Participation.