American multinational toy company Mattel partnered with ToyTalk to create Barbie dolls that are connected to the Internet. However, the doll suffers insecurities as researchers found out that the doll was prone to a bug known as Poodle.
Hello Barbie, the iconic doll that can connect to the Internet designed by Mattel, has been found out to have insecurities by computer security researchers. The doll's accompanying app for iOS and Android has been found out to have several flaws that might allow hackers to eavesdrop on communications between the doll and the cloud servers where it is connected.
Hello Barbie uses wireless fidelity to transmit audio from children talking to the dolls to the servers, which process the communication and responses in return. It acts like a child's digital assistant, like Cortana from Microsoft or Siri from Apple.
OpenDNS Research Director Andrew Hay along with Bluebox Security researchers discovered that the doll uses a digital ID system that hackers can abuse. Potentially, the flaw may permit them to spy on communications between the server and the doll. Also, the vulnerability affects the Hello Barbie app for Android and iOS. In addition to the flaw, researchers discovered that smartphones with the Hello Barbie app will automatically connect to Wi-Fi networks with "Barbie" names attached to them.
Padding Oracle On Downgraded Legacy Encryption, also known as the Poodle bug, is a middleman exploit that destroys encryptions. This is the main reason that researchers from Google raised the alarm more than a year ago as it failed the tech giant's clients back to SSL 3.0.
Mattel partnered with ToyTalk in designing the Hello Barbie app. On the other hand, ToyTalk is a startup technology company founded in 2011 by former Pixar executives.
ToyTalk Chief Technology Officer and co-founder Martin Reddy stated that Bluebox alerted them of the problem and that they have been working on the issue. Nevertheless, he did not mention whether the issue was in the authentication credential or the digital ID, or whether the vulnerability had been fixed or an app release update would be coming soon to fix the issue.