Segway miniPRO scooter had a huge, dangerous security hole

My Segway miniPRO had a critical vulnerability and I didn't know about it.
 By 
Lance Ulanoff
 on 
Original image replaced with Mashable logo
Original image has been replaced. Credit: Mashable

A scooter you can also remote control sounds cool, until you find out it can be hacked. Then it's not cool at all — it's terrifying.

Every Friday, I ride an electric Segway/Ninebot miniPRO around the office. It's my favorite rideable (A.K.A. balance board, A.K.A., hoverboard). It's also the only one that includes a remote control that I can use to send it running around the office on its own.

The remote control does not work when I'm standing on the Segway miniPRO, which itself is essentially a tiny version of the original self-balancing mobility device introduced 16 years ago by inventor Dean Kamen.

Aside from the size, the other major difference is from the original Segway is that instead of using handles to steer the scooter, the miniPRO employs a knee-height stem for direction control.

But researchers at IOActive figured out how to hack into the Segway miniPRO and trigger remote-control features while someone is riding the board, making it speed up, slow down, and even stop dead in its tracks without the riders' consent.

Since the Segway miniPRO can travel at up to 10 mph, a sudden stop could throw the rider, causing serious injury or at least deep embarrassment. IOActive revealed its findings on Wednesday.

Discovered by security researcher Thomas Kilbride last year, the Segway vulnerability left open Bluetooth communication between the dedicated Ninebot App and the Segway miniPRO. Kilbride used the access to bypass a communication PIN, which apparently was not required to establish communications, even though it is part of the initial setup. Kilbride explained his findings in the video below.

After intercepting Bluetooth communications, Kilbride reverse-engineered its protocol. Kilbride used a Bluetooth connection utility app (Nordic UART) to connect directly to the Segway miniPRO. He then used this connection to reset the PIN. Kilbride also employed the Ninebot app's built in "Find other riders near me" capabilities to target other Segway miniPROs.

Using the new PIN, Kilbride connected his local Ninebot app to a nearby Segway miniPRO and then uploaded a new piece of firmware. Apparently, the system did not include, according to IOActive's Security Advisory, any integrity checks on firmware images before accepting a firmware update.

By the time Kilbride was done, someone else's Segway miniPRO was under his control. Fortunately, Kilbride only performed proof-of-concept tests with knowing participants.

The good news is that IOActive is a white hat firm and informed Segway/Ninebot about the vulnerability last December. Segway/Ninebot, in turn, let IOActive know that the company had patched the critical issues in April.

While I'm happy that Segway/Ninebot took care of this massive security hole, the stunning lack of checks and balances in the original product are disturbing.

There was no communication encryption, the PIN code wasn't hardwired into remote control, and firmware update protocols were sloppy at best.

Segway/Ninebot gets credit for building an excellent rideable that, unlike some early competitors, meets all the Underwriters Laboratories (UL) criteria for not catching on fire or blowing up, but they left us vulnerable in an equally dangerous way.

Mashable has reached out to Segway/Ninebot to confirm IOActive's findings and that the vulnerabilities were patched and will update this post with their response.

If you own a Segway miniPRO scooter, be sure you're running the latest Ninebot software (Version 4.0) and download the newest firmware (1.4.0). I just updated our scooter and plan to ride it again on Friday. Wish me luck.

Topics Innovations

Mashable Image
Lance Ulanoff

Lance Ulanoff was Chief Correspondent and Editor-at-Large of Mashable. Lance acted as a senior member of the editing team, with a focus on defining internal and curated opinion content. He also helped develop staff-wide alternative story-telling skills and implementation of social media tools during live events. Prior to joining Mashable in September 2011 Lance Ulanoff served as Editor in Chief of PCMag.com and Senior Vice President of Content for the Ziff Davis, Inc. While there, he guided the brand to a 100% digital existence and oversaw content strategy for all of Ziff Davis’ Web sites. His long-running column on PCMag.com earned him a Bronze award from the ASBPE. Winmag.com, HomePC.com and PCMag.com were all been honored under Lance’s guidance.He makes frequent appearances on national, international, and local news programs including Fox News, the Today Show, Good Morning America, Kelly and Michael, CNBC, CNN and the BBC.He has also offered commentary on National Public Radio and been interviewed by newspapers and radio stations around the country. Lance has been an invited guest speaker at numerous technology conferences including SXSW, Think Mobile, CEA Line Shows, Digital Life, RoboBusiness, RoboNexus, Business Foresight and Digital Media Wire’s Games and Mobile Forum.

Mashable Potato

Recommended For You

Webb telescope zooms in on a black hole's messy feeding zone
An artist's rendering of the Circinus galaxy's supermassive black hole


Hacker says he accidentally breached 7,000 DJI robot vacuums with a PS5 controller
DJI Romo robot vacuum driving toward dock, tinted blue and red

Updating your security mindset: Keep your data private and your devices secure
By PCMag
Cyber Security

More in Tech

Trending on Mashable
NYT Connections hints today: Clues, answers for April 3, 2026
Connections game on a smartphone

Wordle today: Answer, hints for April 3, 2026
Wordle game on a smartphone

NYT Connections hints today: Clues, answers for April 4, 2026
Connections game on a smartphone

Google launches Gemma 4, a new open-source model: How to try it
Google Gemma

Wordle today: Answer, hints for April 4, 2026
Wordle game on a smartphone
The biggest stories of the day delivered to your inbox.
These newsletters may contain advertising, deals, or affiliate links. By clicking Subscribe, you confirm you are 16+ and agree to our Terms of Use and Privacy Policy.
Thanks for signing up. See you at your inbox!