Vulnerability in Rabbit R1 AI personal assistant exploited
Cybernews researchers gain root access
Researchers at Cybernews have successfully gained root access to the Rabbit R1 AI personal assistant by exploiting a vulnerability that has lingered unresolved for five years.
The vulnerability, known as Kamakiri, exploits a flaw in MediaTek systems on chip (SoCs) dating back to January 2019.
This exploit grants elevated privileges and allows attackers with physical access to the device to manipulate its firmware extensively. The researchers discovered that this flaw permits not only the modification of storage contents but also the injection of malicious code into the device’s kernel or system processes.
According to Cybernews researchers, Kamakiri is commonly used to hack and modify Android devices. It enabled them to extract Rabbit R1’s original firmware, change it, disable Android Verified Boot, and install and execute altered firmware.
While enthusiasts might leverage such exploits to customise their devices by gaining root privileges, installing custom operating systems, or running unauthorised applications like TikTok or emulators, the exploit exposes the device to malicious tampering.
“This vulnerability effectively circumvents owner protections, allowing unauthorised access to erase, reset, and potentially resell the device without a trace,” warned the researchers. They cautioned against purchasing second-hand Rabbit R1 devices due to the difficulty of verifying whether they have been compromised.
In response to the findings, Rabbit stated that they are actively investigating solutions with their manufacturing partner and have increased investments in hardware security. They emphasised the risks of tampering or jailbreaking the R1, noting that such actions disconnect the device from its secure ecosystem and may void warranty and support.
“While we encourage innovation, we urge users to refrain from modifying their R1 devices as it compromises their security,” Rabbit cautioned in a statement to Cybernews.
They indicated ongoing evaluation of approaches to engage with third-party developers while maintaining security standards.
The revelation underscores the ongoing challenges in securing IoT devices against sophisticated exploits, highlighting the need for robust security measures and vigilant oversight to safeguard user data and device integrity.
According to Cybernews researchers, Kamakiri is commonly used to hack and modify Android devices. Featured image: Credit: Cybernews