3
top 5 comments
sorted by: hot top controversial new old
[-] Oni_eyes@sh.itjust.works 8 points 3 days ago

Well shit, you might just get the whole south riled up about cyber security now.

[-] EdanGrey@sh.itjust.works 7 points 3 days ago

Why does a grill even need to be that high tech?

[-] Oni_eyes@sh.itjust.works 5 points 2 days ago* (last edited 2 days ago)

Because some people want to jump straight into bbq without experience and have a bunch of money to compensate for knowledge about timing and when to test temps and what smells you're waiting for.

Also, more precise temperature control for the cook who wants to try out other methods for elevating their bbq game.

[-] fuzzzerd@programming.dev 3 points 2 days ago

This whole problem could be avoided by running the API on the grill itself, fully locally on the lan.

Seems like the grill is a dumb client that polls the cloud API to determine what action to take, and then the phone app pushes commands to the cloud for the grill.

An overly complicated setup that only forces you into their walled garden.

[-] autotldr@lemmings.world 2 points 3 days ago

This is the best summary I could come up with:


Keen meatheads better hope they haven't angered any cybersecurity folk before allowing their Traeger grills to update because a new high-severity vulnerability could be used for all kinds of high jinks.

With summer in full swing in the northern hemisphere, it means BBQ season is upon us, and with Traeger being one of the most trusted brands in grilling and smoking, there's a good chance that many backyard cookouts could be ruined if crafty crims have their way.

Successful exploits could allow a remote attacker to execute day-ruining commands such as temperature change controls or shutting down the grill altogether.

Should the temperature be adjusted mid-cook from a gentle low flame to searing heat, it could be the difference between a backyard gathering for the ages and the worst day of a host's year.

To get the ball rolling, they retrieved a pairing token from the Traeger API after making a POST request and registered it to an AWS IoT Cognito identity.

A second, less severe vulnerability (4.3 – medium) was also disclosed by Bishop Fox after researchers found a way to remotely force Traeger's GraphQL API to list every grill registered with the manufacturer with a short POST request.


The original article contains 709 words, the summary contains 200 words. Saved 72%. I'm a bot and I'm open source!

this post was submitted on 04 Jul 2024
3 points (66.7% liked)

Cybersecurity

4987 readers
78 users here now

c/cybersecurity is a community centered on the cybersecurity and information security profession. You can come here to discuss news, post something interesting, or just chat with others.

THE RULES

Instance Rules

Community Rules

If you ask someone to hack your "friends" socials you're just going to get banned so don't do that.

Learn about hacking

Hack the Box

Try Hack Me

Pico Capture the flag

Other security-related communities !databreaches@lemmy.zip !netsec@lemmy.world !cybersecurity@lemmy.capebreton.social !securitynews@infosec.pub !netsec@links.hackliberty.org !cybersecurity@infosec.pub !pulse_of_truth@infosec.pub

Notable mention to !cybersecuritymemes@lemmy.world

founded 1 year ago
MODERATORS