Hacking

Vulnerabilities in the Jacuzzi SmartTub app could allow to access users’ data

Researchers discovered multiple vulnerabilities in Jacuzzi SmartTub app web interface that can expose private data.

Multiple vulnerabilities in Jacuzzi SmartTub app web interface could have disclosed private data to attackers, security researcher Eaton Zveare warns.

The experts attempted to notify the company without success, meantime the flaws have been addressed.

The SmartTub app, which is available for both iOS and Android, allows customers to remotely control the Jacuzzi SmartTub, such as setting the water temperature and turn on the water jet.

SmartTub is composed of a module inside the tub with cell data reception that can manage tub functionality, and the mobile app. The tub module is always connected to a central server, providing tub status updates and listening for commands.

To test the SmartTub the expert created an account using the app and testing it, such as adding the account password to the password manager and checking what website/URL should be associated with it. The expert noticed that the account confirmation email came from smarttub.io, so that is what I used.

“After setting the password in my password manager, I went to the smarttub.io site to see what was there. There was an Auth0-branded login page. SmartTub uses Auth0 for their login and user account system. If you don’t want to build your own login and user account system, Auth0 is a good choice and saves you a lot of time by providing a full & secure user account system out of the box. Anything you build from scratch is unlikely to be as secure as Auth0’s offerings.” reads a post published by the expert. “I entered my details, thinking this was a website alternative to the mobile app. I was greeted with an Unauthorized screen”

Right before that message appeared, the expert noticed a header and table briefly flash on his screen. Using a screen recorder he was able to capture it and discover the access page was for an admin panel populated with user data.

smarttub.io is hosted a single-page-application (SPA) built using React. The panel is built as a single-page-application (SPA) and the usernames and passwords were sent to a third-party verification platform Auth0.

The researcher was able to modify HTTP response using the Fiddler tool and was finally able to access to the admin panel.

Once authenticated to the portal, attackers can access users’ first and last names, email addresses, phone number (optional) and other sensitive data

“Once into the admin panel, the amount of data I was allowed to was staggering. I could view the details of every spa, see its owner and even remove their ownership.” concludes the expert.

The researcher reported the flaw to Jacuzzi Brands in December, and the company addressed it on 4 June.

Follow me on Twitter: @securityaffairs and Facebook

[adrotate banner=”9″][adrotate banner=”12″]

Pierluigi Paganini

(SecurityAffairs – hacking, Jacuzzi)

[adrotate banner=”5″]

[adrotate banner=”13″]

Pierluigi Paganini

Pierluigi Paganini is member of the ENISA (European Union Agency for Network and Information Security) Threat Landscape Stakeholder Group and Cyber G7 Group, he is also a Security Evangelist, Security Analyst and Freelance Writer. Editor-in-Chief at "Cyber Defense Magazine", Pierluigi is a cyber security expert with over 20 years experience in the field, he is Certified Ethical Hacker at EC Council in London. The passion for writing and a strong belief that security is founded on sharing and awareness led Pierluigi to find the security blog "Security Affairs" recently named a Top National Security Resource for US. Pierluigi is a member of the "The Hacker News" team and he is a writer for some major publications in the field such as Cyber War Zone, ICTTF, Infosec Island, Infosec Institute, The Hacker News Magazine and for many other Security magazines. Author of the Books "The Deep Dark Web" and “Digital Virtual Currency and Bitcoin”.

Recent Posts

Mozilla fixed zero-days recently demonstrated at Pwn2Own Berlin 2025

Mozilla addressed two critical Firefox vulnerabilities that could be potentially exploited to access sensitive data…

2 hours ago

Japan passed a law allowing preemptive offensive cyber actions<gwmw style="display:none;"></gwmw>

Japan passed a law allowing preemptive offensive cyber actions, shifting from its pacifist stance to…

7 hours ago

Pwn2Own Berlin 2025: total prize money reached $1,078,750

Pwn2Own Berlin 2025 wrapped up with $383,750 awarded on the final day, pushing the total…

13 hours ago

SECURITY AFFAIRS MALWARE NEWSLETTER ROUND 45

Security Affairs Malware newsletter includes a collection of the best articles and research on malware…

1 day ago

Security Affairs newsletter Round 524 by Pierluigi Paganini – INTERNATIONAL EDITION

A new round of the weekly SecurityAffairs newsletter arrived! Every week the best security articles…

1 day ago