A security researcher says intercourse toy maker Lovense has failed to completely repair two security flaws that expose the non-public e mail deal with of its customers and permit the takeover of any consumer’s account.
The researcher, who goes by the deal with BobDaHacker, printed particulars of the bugs on Monday after Lovense claimed it might want 14 months to repair the failings in order to not inconvenience customers of a few of its legacy merchandise.
Lovense is without doubt one of the largest makers of internet-connected intercourse toys, and is alleged to have greater than 20 million customers. The corporate made headlines in 2023 for changing into one of many first intercourse toy makers to combine ChatGPT into its merchandise.
However the inherent security dangers in connecting intercourse toys to the web can put customers vulnerable to real-world hurt if one thing goes fallacious, together with system lock-ins and knowledge privateness leaks.
BobDaHacker mentioned they found that Lovense was leaking different folks’s e mail addresses whereas utilizing the app. Though different customers’ e mail addresses weren’t seen to customers within the app, anybody utilizing a community evaluation device to examine the information flowing out and in of the app would see the opposite consumer’s e mail deal with when interacting with them, akin to muting them.
By modifying the community request from a logged-in account, BobDaHacker mentioned they may affiliate any Lovense username with their registered e mail deal with, probably exposing any buyer who has signed as much as Lovense with an identifiable e mail deal with.
“This was particularly unhealthy for cam fashions who share their usernames publicly however clearly don’t need their private emails uncovered,” BobDaHacker wrote of their weblog submit.
information.killnetswitch verified this bug by creating a brand new account on Lovense and asking BobDaHacker to disclose our registered e mail deal with, which they did in a few minute. By automating the method with a pc script, the researcher mentioned they may receive a consumer’s e mail deal with in lower than a second.
BobDaHacker mentioned a second vulnerability allowed them to take over any Lovense consumer’s account utilizing simply their e mail deal with, which could possibly be derived from the sooner bug. This bug lets anybody create authentication tokens for accessing a Lovense account without having a password, permitting an attacker to remotely management the account as in the event that they had been the true consumer.
“Cam fashions use these instruments for work, so this was an enormous deal. Actually anybody may take over any account simply by figuring out the e-mail deal with,” mentioned BobDaHacker.
The bugs have an effect on anybody with a Lovense account or system.
BobDaHacker disclosed the bugs to Lovense on March 26 through the Web of Dongs, a undertaking that goals to enhance the security and privateness of intercourse toys, and helps report and disclose flaws to system makers.
In accordance with BobDaHacker, they had been awarded a complete of $3,000 through bug bounty website HackerOne. However after a number of weeks of forwards and backwards disputing whether or not the bugs had been truly fastened, the researcher went public this week after Lovense requested 14 months to repair the failings. (Safety researchers usually grant distributors three months or much less to repair a security bug earlier than going public with their findings.) The corporate instructed BobDaHacker in the identical e mail that it determined towards a “quicker, one-month repair,” which might have required forcing prospects utilizing older merchandise to improve their apps instantly.
The researcher notified the corporate forward of disclosure, per an e mail seen by information.killnetswitch. BobDaHacker mentioned in a weblog submit replace on Tuesday that the bug might have been recognized by one other researcher way back to September 2023, however the bug was allegedly closed and not using a repair.
Lovense didn’t reply to an e mail from information.killnetswitch.



