The update adds the following registry keys in Windows Embedded CE 6.0 R3:
- HKEY_LOCAL_MACHINE\Software\Microsoft\MTP\Responder
- HKEY_LOCAL_MACHINE\Drivers\USB\FunctionDrivers\MTPUSBFn
- HKEY_LOCAL_MACHINE\Software\Microsoft\MTP\Responder\Metadata\<Locale ID>
- HKEY_LOCAL_MACHINE\Software\Microsoft\MTP\ObjectStore
As an OEM developer, you must understand the following potential security threats when you create devices that use the MTP Responder component. To prevent these threats, check the recommendations at the end of each paragraph.
Information disclosure threat
Users should be warned not to store Personally Identifiable Information (PII) on their device. An attacker may use the IP network to copy the information from the device without the user’s acknowledgement. To help protect device users, we recommend that you include a warning in the user documentation stating that users should not store PII on a device.
Spoofing threat
There is no trust relationship between a device that works as an MTP Responder and the MTP Initiator that is connected to this device. This could lead to a spoofing attack on the device. For example, an MTP Initiator could identify itself as a common default name for a home network, such as 'linksys'. Meanwhile, the network can be used to obtain sensitive data from the device. The network can also be taken over to start a denial of service attack on another computer. To help reduce this risk, we recommend that you include a warning in the user documentation that resembles the following statement:
Make sure that your home network is password protected and only connect your device to public networks that are trusted.
Closed box assumption
If you ship a closed box solution for a device that uses MTP, MTP initiators can still copy data on and off the device. In order to help reduce the security risk of copying malware to the device, you should implement code signing. Code signing makes sure that only trusted code runs on the device. For more information about code signing, visit the following Microsoft Developer Network (MSDN) Web site:
Note A closed box solution does not allow third-party applications or modules to be loaded on the system.
MTP over IP
By default, MTP over IP is enabled. This means that MTP Initiators can connect to a device that uses MTP. However, this makes MTP over IP sessions vulnerable to security threats such as spoofing, information disclosure, and denial of service. To help prevent these security threats, we recommend that you create a mechanism that lets the user accept each MTP over IP session. Or, you can create a mechanism that lets the user keep IP connections off until the user wants to connect. For more information about the MTP Device Services Extension specification, download the file from the following Microsoft Web site:
For more information about software update terminology, click the following article number to view the article in the Microsoft Knowledge Base:824684 Description of the standard terminology that is used to describe Microsoft software updates