Kuboid
Open Luck·Kuboid.in
Black Hat2024
Open in YouTube ↗

Breaking Matter: Vulnerabilities in the Matter Protocol

Black Hat1,271 views39:4712 months ago

This talk demonstrates two novel vulnerabilities in the Matter IoT protocol: a 'Delayed Denial of Service' (DeedoS) attack and a feature enumeration technique. These attacks exploit the lack of cryptographically protected message freshness in the CASE (Certificate Authenticated Session Establishment) protocol and the default 'deny-all' access control behavior. The research highlights how these flaws can be used to disable Matter-enabled devices or map their capabilities, and provides a packet-based fingerprinting method for detection. The speaker also discusses the implications for device security and the need for improved protocol design and monitoring.

Breaking Matter: How a Single Packet Can Silence Your Entire Smart Home

TLDR: Researchers at Black Hat 2024 uncovered two critical vulnerabilities in the Matter IoT protocol: a "Delayed Denial of Service" (DeedoS) attack and a feature enumeration technique. By exploiting the lack of cryptographic protection for message freshness in the CASE protocol, an attacker can force devices to drop sessions or map their internal capabilities. These flaws affect all Matter-enabled devices and underscore the urgent need for rigorous protocol-level security monitoring in smart home environments.

Smart home security has long been a game of whack-a-mole, where every new protocol promises to fix the fragmentation of the past while introducing a fresh set of implementation flaws. Matter was supposed to be the industry-unifying standard that finally brought order to the chaos of Zigbee, Z-Wave, and proprietary Wi-Fi implementations. It promised interoperability and security by design. However, as recent research presented at Black Hat 2024 demonstrates, the complexity of this new standard has created a massive attack surface that we are only just beginning to map.

The DeedoS Attack: Exhausting Session Slots

The core of the issue lies in the Certificate Authenticated Session Establishment (CASE) protocol, which Matter uses to secure communication between nodes. During the research, it became clear that the protocol design assumes a level of trust that simply does not exist in the wild. Specifically, the messageCounter field, which is intended to provide replay protection, is not cryptographically bound to the message in a way that prevents manipulation by an attacker who can intercept and replay traffic.

The "Delayed Denial of Service" (DeedoS) attack is deceptively simple. Because Matter devices have limited memory and processing power, they maintain a finite number of active session slots. An attacker does not need to compromise the encryption keys to disrupt the network. By replaying captured Sigma1 messages—the initial handshake packets—at a low rate of roughly two packets per second, an attacker can exhaust the device's session management resources.

The impact is total. Once the session slots are filled, the device stops accepting new connections. Because the attack is "delayed," the device remains functional for a period, making it difficult for users to correlate the loss of connectivity with a specific malicious event. When the attack is active, the device effectively drops off the network, rendering all smart home automations useless. This is a classic Denial of Service scenario, but one that is particularly potent because it targets the protocol's state machine rather than its bandwidth.

Feature Enumeration: Mapping the Smart Home

Beyond simple disruption, the research highlights a significant information disclosure vulnerability, tracked as CVE-2024-3454. Matter devices are designed to be isolated within a fabric, but the protocol's error-handling mechanisms provide a side-channel for reconnaissance.

When an attacker attempts to interact with a device's clusters or attributes, the device returns specific error codes: UNSUPPORTED_CLUSTER or UNSUPPORTED_ACCESS. By systematically querying a device and observing these responses, an attacker can map the entire feature set of a target device. This is not just theoretical; it allows an attacker to identify exactly what a device is capable of—whether it is a smart lock, a light bulb, or a thermostat—without needing any prior authentication.

For a pentester, this is a goldmine. You can use the chip-tool to automate these queries. By iterating through possible cluster IDs, you can build a comprehensive profile of the target's capabilities. This reconnaissance phase is critical for tailoring subsequent attacks, as it allows you to focus your efforts on the most sensitive or vulnerable components of the device's firmware.

Real-World Implications for Pentesters

If you are performing a security assessment on an IoT ecosystem, you need to stop treating Matter devices as black boxes. The assumption that the "fabric" is a secure perimeter is dangerous. During an engagement, your first step should be to monitor the traffic for Sigma1 messages. If you can capture these, you have the potential to trigger the DeedoS condition.

Furthermore, the lack of version negotiation in the current Matter specification means that even if a vendor patches a vulnerability, the network remains as weak as its oldest device. If you find a single device running an outdated SDK, you have a foothold to map the network's capabilities. The NVD entry for CVE-2024-3297 provides further context on the severity of these session-handling flaws.

The Defensive Path Forward

Defending against these attacks is difficult because they exploit the fundamental logic of the protocol. Patching is the only real fix, and that requires vendors to update their SDKs to at least version 1.1. However, as we know, IoT patching is notoriously unreliable.

Blue teams should focus on traffic analysis. Because Matter traffic is relatively static, you can build a "packet fingerprint" for your devices. By monitoring for anomalies in the frequency of Sigma1 messages or unusual patterns of error responses, you can detect both the DeedoS attack and the reconnaissance phase of a feature enumeration attempt.

We are at a critical juncture for the Matter protocol. It is a powerful standard, but it is currently being deployed with the same "security through obscurity" mindset that plagued the first generation of IoT devices. As researchers, our role is to force the industry to move faster than the attackers. If you are working with these devices, start by auditing the SDK versions in your environment and, more importantly, start looking at the traffic. The protocol is only as secure as the implementation, and right now, the implementation is leaving the door wide open.

Talk Type
research presentation
Difficulty
advanced
Category
iot security
Has Demo Has Code Tool Released


Black Hat Europe 2024

52 talks · 2024
Browse conference →
Premium Security Audit

We break your app before they do.

Professional penetration testing and vulnerability assessments by the Kuboid Secure Layer team. Securing your infrastructure at every layer.

Get in Touch
Official Security Partner
kuboid.in