Labelling for End-of-Life Consumer IoT

|
Updated

Yesterday, Rob and Tod dug into the details of some proposed language for IoT labelling for End-of-Life (EOL) and End-of-Service (EOS) devices proposed by our friends at the Center for Democracy and Technology (CDT) and other consumer advocacy groups.

The language is especially concerned about labelling for kidtech and medtech, and wants vendors to be more responsible for letting people know when their IoT toys, medical gear, and assorted other internet-connected doo-dads won't be supported with security and usability patches and updates.

You can read lots of opinions on this topic, including ours, at the Dark Reading article by Arielle Waldman, but to expand a little more on our concerns here, I wanted to jot down some things to keep in mind when thinking about how EOL/EOS actually works when it comes to labelling and handling it in your environment.

Notionally, it's a good idea to label consumer tech with an EOL/EOS date, but the devil will absolutely be in the details of how that will actually work. After all, you probably want to know that your Thing of the Internet will be vendor-supported tomorrow if you buy it today. Practically, though, it gets complicated, and fast. Every such Thing made today has a software stack, that in turn is often drawn from dozens to hundreds of open source projects. These software sources, the hardware assembler (who is usually the "vendor"), and the retailer all have to agree on pushing out a patch or update.

Here in infosec, we need to really internalize the idea that just because something is missing a patch doesn't mean it stops working, so it's a sneaky fail case that's hard for consumers to even notice. At the same time, your home network and all the stuff attached to it is now often also touching your employer network, so keeping up on patching at home is becoming a corporate IT problem. With work-from-home, IT is responsible for the PlayStation in the CEO’s living room. Sophisticated attacks can target developers at home, and have, by subverting the usual write code-compile-ship workflow at the "write code" part.

As far as the actual notification mechanism is concerned, while physical labelling on docs and the device can be helpful, we need to appreciate that the secondary market -- selling your stuff on eBay or donating it to Goodwill -- will break the relationship between customer and vendor, making timely notification (such as by warranty card) that much more difficult. Besides, just because a vendor tells you when the EOL date is doesn’t mean they have to tell you how to keep patched, or make it easy. Autoupdates can help, until the autoupdate service itself goes EOL. And these EOL/EOS dates aren't set in stone -- some vendors will backport patches (Microsoft) past EOL if it's really serious. Some don't (F5 nginx), and require you to update.

So, I'm super curious to see where this model language goes and if we'll make some headway in being open and transparent about the realities of maintaining old tech on your home network. Of course, that's an especially relevant question if your home network is so close to your employer's network. After all, if you're a knowledge worker in America today, your aging internet devices are really starting to become your CISO's problem.

Written by Rob King

Rob King is the Director of Security Research at runZero. Over his career Rob has served as a senior researcher with KoreLogic, the architect for TippingPoint DVLabs, and helped get several startups off the ground. Rob helped design SC Magazine's Data Leakage Prevention Product of the Year for 2010, and was awarded the 3Com Innovator of the Year Award in 2009. He has been invited to speak at BlackHat, Shmoocon, SANS Network Security, and USENIX.

More about Rob King

Written by todb

Tod Beardsley is VP of Security Research at runZero, where he "kicks assets and fakes frames." Prior to 2025, he was the Section Chief for the Vulnerability Response section for CSD/VM/VRC at CISA, the Cybersecurity and Infrastructure Security Agency, part of the US government. He's also a founder and CNA point of contact for AHA!. He spends much of his time involved in vulnerability research and coordinated vulnerability disclosure (CVD). He has over 30 years of hands-on security experience, stretching from in-band telephony switching to modern ICS/OT implementations. He has held IT ops, security, software engineering, and management positions in large organizations such as the Rapid7, 3Com, Dell, and Westinghouse, as both an offensive and defensive practitioner. He is also CVE Board member, a Travis County Election Judge in Texas, and an internationally-tolerated horror fiction expert.

More about todb
Subscribe Now

Get the latest news and expert insights delivered in your inbox.

Welcome to the club! Your subscription to our newsletter is successful.


Explore more

Webcasts
The Unreasonable Effectiveness of Inside Out Attack Surface Management
HD Moore, founder of runZero (and previously Metasploit), presents new research that will forever redefine how you approach attack surface...
Webcasts
Safeguarding OT/ICS Assets: Insights from the U.S. Department of Energy
Security experts from the National Renewable Energy Lab’s (NREL) Clean Energy Cybersecurity Accelerator™ (CECA) program join runZero to discuss...
runZero Insights
Ensure compliance with DORA’s ICT risk framework using runZero
Learn how to uncover unmanaged and unknown assets— including IT, OT, and IoT— to meet DORA's hidden risk requirements using runZero.
Talks
DEF CON 32: SSHamble: Unexpected Exposures in SSH (Video)
This talk digs deep into SSH, the lesser-known implementations, many of the surprising security issues found along the way, and how to exploit them.

See Results in Minutes

Get complete visibility into IT, OT, & IoT — without agents, credentials, or hardware.

© Copyright 2025 runZero, Inc. All Rights Reserved