Software Secured Company Logo.
Services
Services
WEB, API & MOBILE SECURITY

Manual reviews expose logic flaws, chained exploits, and hidden vulnerabilities

Web Application Pentesting
Mobile Application Pentesting
Secure Code Review
Infrastructure & Cloud Security

Uncovers insecure networks, lateral movement, and segmentation gaps

External Network Pentesting
Internal Network Pentesting
Secure Cloud Review
AI, IoT & HARDWARE SECURITY

Specialized testing validates AI, IoT, and hardware security posture

AI Pentesting
IoT Pentesting
Hardware Pentesting
ADVANCED ADVERSARY SIMULATIONS

We simulate attackers, exposing systemic risks executives must address

Red Teaming
Social Engineering
Threat Modelling
PENETRATION TESTING AS A SERVICE

PTaaS provides continuous manual pentests, aligned with release cycles

Penetration Testing as a Service
OWASP TOP 10 TRAINING

Practical security training strengthens teams, shifting security left effectively

Secure Code Training
Ready to get started?
Identify real vulnerabilities confidently with zero-false-positive penetration testing
Learn More
Industries
Industries
INDUSTRIES
Data and AI

AI pentesting uncovers adversarial threats, ensuring compliance and investor trust

Healthcare

Penetration testing protects PHI, strengthens compliance, and prevents healthcare breaches

Finance

Manual pentests expose FinTech risks, securing APIs, cloud, and compliance

Security

Penetration testing validates SecurTech resilience, compliance, and customer trust

SaaS

Pentesting secures SaaS platforms, proving compliance and accelerating enterprise sales

CASE STUDY

“As custodians of digital assets, you should actually custodize assets, not outsource. Software Secured helped us prove that our custody technology truly delivers on that promise for our clients in both the cryptocurrency and traditional finance”

Nicolas Stalder,
CEO & Co-Founder, Cordial Systems
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Compliance
Compliance
COMPLIANCE
SOC 2 Penetration Testing

Pentesting validates SOC 2 controls, proving real security to auditors and customers

HIPAA Penetration Testing

Manual pentesting proves HIPAA controls protect PHI beyond documentation

ISO 27001 Penetration Testing

Pentests uncover risks audits miss, securing certification and enterprise trust

PCI DSS Penetration Testing

Pentesting validates PCI DSS controls, protecting sensitive cardholder data

GDPR Penetration Testing

GDPR-focused pentests reduce breach risk, regulatory fines, and reputational loss

CASE STUDY

“Software Secured’s comprehensive approach to penetration testing and mobile expertise led to finding more vulnerabilities than our previous vendors.”

Kevin Scully,
VP of Engineering, CompanyCam
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
PricingPortal
Resources
Resources
COMPLIANCE
Blogs
Case Studies
Events & Webinars
Partners
Customer Testimonials
News & Press
Whitepapers
cybersecurity and secure authentication methods.
API & Web Application Security Testing

The Highest Threat: The Hidden Weakness in Modern API & Web Application Security

Alexis Savard
November 21, 2025
Ready to get started?
Our comprehensive penetration testing and actionable reports have 0 false positives so you can identify
Learn More
Login
Book a Consultation
Contact
Blog
/
Security Research
/
OWASP Top 10 API Vulnerabilities

Insecure by Design: Default Configurations in Embedded Systems

This article explains the “Insecure This article series aims to provide practical, educational insights into security issues across embedded systems. Each entry focuses on a specific vulnerability category—how it arises, why it matters, and how it can be identified and mitigated in real-world environments.

By Kevin Chen
・
9 min read
Table of contents
Text Link
Text Link

As connected embedded devices continue to proliferate across homes, industries, and critical infrastructure, their security weaknesses have become increasingly attractive targets for attackers. This article series aims to provide practical, educational insights into security issues across embedded systems. Each entry focuses on a specific vulnerability category—how it arises, why it matters, and how it can be identified and mitigated in real-world environments. All vulnerabilities discussed in this series are well known or have already been patched by their respective vendors.

      OWASP IoT Top 10

‍Insecure Default Settings‍

Even though there are many different types of vulnerabilities, OWASP has fortunately compiled a clear list of the most significant ones. Let’s begin with one of the simplest yet most critical issues found in almost all OWASP Top 10 lists: Insecure Default Settings. By definition, any device or system that ships with insecure default settings—or prevents operators from modifying default configurations to enhance security—falls into this category. These insecure settings may include default usernames and passwords (e.g., admin/admin), unencrypted protocols, or unnecessary services and open ports (such as HTTP, Telnet, and FTP). Attackers can easily exploit these defaults to enroll devices in botnets, gain remote control, or access sensitive data without any authentication. Next, we will review case studies of popular products to illustrate the real-world risks posed by these vulnerabilities.

‍Case-Study: Kobo eReader

Our first device is the Kobo eReader, a popular product readily available in consumer electronics stores across Canada. Kobo is widely recognized as an alternative to the Amazon Kindle, and the company even offers a dedicated webpage focused on product security. While browsing their website, one statement immediately caught my attention: Kobo claims that their eReaders do not use universal default or easily guessable passwords. From the perspective of an experienced pentester, there’s only one way to find out whether that claim holds true.

Kobo’s security policy web page

Kobo offers various models and firmware versions of its eReaders. The unit we tested is the Kobo Clara Colour running firmware v4.41.23145, and later upgraded to v4.42.23296 for retesting.

Kobo’s firmware information displayed

Using a thin blade, the case can be popped open easily. A closer inspection shows that the device is powered by a MediaTek ARM processor and uses an eMMC chip for storage, which is an upgrade from the earlier models that relied on SD cards for file storage.

‍

Kobo’s internal PCB layout exposed

What really caught my attention was the presence of clearly labeled debug ports, with the TX/RX pins indicating UART connections.

‍

 Kobo’s UART debug port exposed

After identifying the correct baud rate, we were able to receive readable output and were greeted with a login prompt from the Kobo eReader. The next question was obvious: what are the credentials?

When the Kobo eReader is powered on for the first time, it contacts the remote server to check for firmware updates. The device also supports firmware updates with a USB connection. We can download the firmware directly from a third-party website for inspection. We found that until Kobo firmware version 4.41.23145, the device’s /etc/passwd file contained a secret admin account with a password hash. 

The default credentials turned out to be the infamous “admin/admin” pair. This finding directly contradicts Kobo’s claim that they do not use universal default or easily guessable passwords.

We were then able to verify this by logging into the Kobo eReader using those credentials, which granted us root privileges.

‍

Later, Kobo released firmware patch v4.42.23296 in May 2025, which appears to have addressed this issue. By testing this patch, we confirmed that the admin account has been removed.

However, another insecure default setting remains. The Kobo eReader does not implement key signing for the firmware. As a result, an attacker can remove the root password, update the firmware, and easily regain root access to the device.

Once we gained shell access to the Kobo eReader, post‑exploitation of the device became effortless. For instance, the wpa_supplicant.conf file located in /etc/wpa_supplicant/ stores the plain‑text encryption keys for every Wi‑Fi network the device has ever connected to. An attacker could use this information as a stepping‑stone to further penetrate the surrounding network.

Case-Study: Bitcoin ATM

Web3 and cryptocurrency security have received a lot of attention over the past few years; however, cryptocoin ATM security remains an area that is far less explored. Are these machines secure? How easy is it for an attacker to gain full control? In this case study, we demonstrate how basic physical access—combined with insecure default settings—can allow an attacker to fully compromise and even potentially “jackpot” a Bitcoin ATM. 

The vendor was notified and asserts that the identified issues have been remediated. Since this vulnerability can potentially have a severe impact on the ATM users' finances, the brand will remain unnamed.

The ATM that we hacked looks just like any other ATM that you would find at a shopping mall; the only difference is that it is used exclusively for buying and selling Bitcoin and other cryptocurrencies. On the touchscreen, it displays the current prices of various cryptocurrencies. Everything appears straightforward and easy to use… what could possibly go wrong?

‍

Anyone with experience in pentesting kiosk machines knows that randomly tapping around the interface can sometimes trigger unexpected behavior, such as a login prompt appearing or a hidden function being exposed. And that’s exactly what happened here. By tapping the edge of the screen, we discovered that a hidden, but quite familiar,configuration window would pop up.  

 

From there we accessed the full control panel, and by tapping on the system logo, the details of the OS were revealed: Windows 10.

‍

We were able to bring up a command prompt, where we discovered that the system ran on an account with administrative privileges. Additionally, Internet access was completely unrestricted, and we could even see other ATMs on the same network, which made lateral movement entirely feasible. 

For demonstration purposes, we temporarily disabled the system’s built-in defender so we could download and execute the well-known Mimikatz (A powerful tool for Windows that extracts plain-text passwords from memory) on the ATM. 

‍

We were also able to open a File Explorer window and access all locally stored files, including the ATM application file and its configuration files. We stopped at this point, but a malicious attacker could easily go further; they may reverse-engineer the executable and—if they’re lucky—jackpot the ATM by withdrawing all funds from it.

‍

And finally, who could possibly resist playing DOOM on a Bitcoin ATM? :P But in all seriousness, this case study shows that compromising a Bitcoin ATM can be surprisingly easy when insecure default settings are left in place. I strongly urge vendors to ensure that their products are properly secured before shipping them. Additionally, I encourage Canadian regulators to take this emerging field seriously and invest the necessary attention and oversight.

‍

Securing Embedded Devices Against Default Misconfigurations‍

The lesson learned from the real-world case studies above is that insecure default settings can lead to unexpected outcomes that can potentially damage a company’s brand or even disrupt entire business operations. Therefore, to help mitigate this vulnerability, ensure that the system is configured to force users to change default credentials during setup, and that the system disables all unused services or ports to minimize the attack surface. Additionally, as a best practice, engage with experienced penetration testers to conduct a comprehensive security inspection.

‍References: 

‍CWE-284: Improper Access Control

‍CWE-1392: Use of Default Credentials

‍OWASP IoT Top 10 2018 Mapping Project

‍CWE-1263: Improper Physical Access Control 

‍Kobo Firmware Downloads | Patrick Gaskin’s KoboStuff 

‍

About the author

Kevin Chen

BIO: Kevin (Kevin2600) Chen is an intermediate penetration tester with extensive cybersecurity experience, specializing in pentesting and vulnerability research on wireless and embedded systems. He is a frequent speaker at notable conferences, including BSides, DEFCON, and CANSECWEST.

Continue your reading with these value-packed posts

Vulnerability Management & Scoring

Avoiding Security Theatre: When is a "Critical" Really a Critical?

Alex Hewko
Alex Hewko
8 min read
September 30, 2021
Network Full Protection
Cloud Penetration Testing

Network Full Protection: The Role of Internal and External Network Pentesting

Cate Callegari
Cate Callegari
7 min read
December 10, 2024
SOC 2 Penetration Testing

Do You Need Penetration Testing for Compliance?

Cate Callegari
Cate Callegari
10 min read
October 16, 2024

Get security insights straight to your inbox

Helping companies identify, understand, and solve their security gaps so their teams can sleep better at night

Book a Consultation
Centralize pentest progress in one place
Canadian based, trusted globally
Actionable remediation support, not just findings
Web, API, Mobile Security
Web App PentestingMobile App PentestingSecure Code Review
Infrastructure & Cloud Security
External Network PentestingInternal Network PentestingSecure Cloud Review
AI, IoT & Hardware Security
AI PentestingIoT PentestingHardware Pentesting
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
More Services
Pentesting as a ServiceSecure Code Training
Industries
Data and AIFinanceHealthcareSecuritySaaS
Compliance
GDPR PentestingHIPAA PentestingISO 27001 PentestingPCI DSS PentestingSOC 2 Pentesting
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
More
PricingPortalPartnersContact UsAbout UsOur TeamCareers
Resources
BlogsCase StudiesEvents & WebinarsCustomer TestimonialsNews & PressWhitepapers
Security & CompliancePrivacy PolicyTerms & Conditions
2025 ©SoftwareSecured