Two students from UC Santa Cruz, Alexander Sherbrooke and Iakov Taranenko, have uncovered a significant security flaw in CSC ServiceWorks’ internet-connected laundry machines. This flaw, affecting over a million machines globally, allows users to run laundry cycles for free by manipulating the mobile app’s API. Despite reporting the issue to CSC ServiceWorks earlier this year, the company has not yet addressed the vulnerability, leaving countless machines susceptible to unauthorized use.
The discovery was made in early January when Sherbrooke managed to start a laundry cycle without any payment by executing a script on his laptop. The students further demonstrated the flaw by creating a fictional balance of several million dollars in their laundry account, which appeared normal in the CSC Go mobile app. This issue exposes a serious vulnerability in the app’s API, which allows it to be exploited for free services. Despite numerous attempts to contact CSC ServiceWorks and even involving Carnegie Mellon University’s CERT Coordination Centre, the students’ concerns were ignored.
Presenting their findings at their university’s cybersecurity club, Sherbrooke and Taranenko highlighted the broader risks of connecting heavy appliances to the internet without adequate security measures. They warned that the vulnerability could lead to more severe consequences, such as overheating and potential fires if safety protocols are bypassed. The flaw remains unpatched, and CSC ServiceWorks quietly deleted the researchers’ false account balance without addressing the root cause.
Taranenko emphasized the importance of real-world security research and offered their assistance to companies dealing with similar issues. The students remain hopeful that CSC ServiceWorks will take immediate action to secure its systems and prevent potential exploitation. Their discovery underscores the necessity for technology vendors to implement robust security checks to protect against vulnerabilities in connected devices.
Reference: