• Home
  • Latest
  • Fortune 500
  • Finance
  • Tech
  • Leadership
  • Lifestyle
  • Rankings
  • Multimedia
TechLeapFrog

Security Researchers Find ‘Worst Case Scenario’ in LeapFrog Kids Tablet

By
Alyssa Newcomb
Alyssa Newcomb
Down Arrow Button Icon
By
Alyssa Newcomb
Alyssa Newcomb
Down Arrow Button Icon
August 7, 2019, 7:30 AM ET

Researchers have found gaping security holes in LeapFrog’s LeapPad Ultimate Tablet for children that could let hackers determine a child’s location, send them messages, and steal sensitive information.

The tablets, which sell for around $80, are geared toward three-to-six-year-olds, and come pre-loaded with everything from game and flashcards, to read-along videos. Parents can also add more than 1,000 other games, eBooks, videos, music, and apps from LeapFrog’s Learning Library.

“The reason we chose LeapFrog is because we are looking at devices that may have hold more serious implications than others,” Erez Yalon, head of security research at security company Checkmarx tells Fortune.

Yalon’s team found several security holes, that if exploited together, could let hackers know a child’s name, age, and gender, where they live, and have the ability to send the child a message to come outside and play.

“We’re looking at the worst case scenario, but as a dad, I’d rather look at the worst case scenario,” Yalon says.

Pet Chat App Gives Away a Kids’ Location

Users of LeapFrog’s Pet Chat app, which lets kids use avatars to chat with other, was pitched as a safe and controlled environment for children. Users could only send a set of pre-loaded emojis and phrases rather than write original messages.

But hackers could have dug into the plumbing powering the Pet Chat app’s chat room. The app created a Wi-Fi connection using the identifier “Pet Chat”, which then broadcast to other compatible devices nearby while restricting access to the greater Internet.

A hacker could have found “Pet Chat” on Wi-Fi and track the MAC address, a unique identifier for networked devices. The hacker could then have visited WiGLE, a website that tracks global wireless hotspots and consolidates location information, to see where kids are using Pet Chat and when a device was last used.

After learning a child’s location, hackers could send them a preset phrase available through the device like “Let’s go!” and “play outside together.” They could then tempt a child to go outside, where the hacker could be waiting.

Stealing sensitive information that could be used against children

Additionally, Checkmarx discovered that hackers could launch phishing and man-in-the-middle attacks to steal information ranging from a kid’s name, gender, and birthday, to a parent’s credit card information, billing address, and phone number.

For example, hackers could spoof an existing Wi-Fi network and force devices on the original network to reconnect to the new, fraudulent one. Since traffic isn’t encrypted, Checkmarx was able to see parents’ and children’s private information when it tried out the hack.

After the devices were logged into the spoof network, Checkmarx was also able to create a fake portal that asked parents for information such as the last six digits of their credit cards on file.

Checkmarx brought the issues to LeapFrog’s attention in December, and said the company worked with it to quickly make changes. LeapFrog made the first fixes in February and then in June confirmed to Checkmarx that it would remove Pet Chat from its app store.

Mari Sunderland, vice preside of digital product management at LeapFrog, says “safety of the children who use our products is a top priority.” 

“With the information they provided, we were able to take immediate actions to resolve the issues,” she says. There have been no reports of anyone exploiting these security holes.

As a parent, Yalon says he wouldn’t let these security problems deter him from buying LeapFrog’s tablet in the future, since the company quickly worked to fix the problems. However, he says he hopes the research will serve as a good reminder that there’s “no such thing as foolproof security,” even if a company tries to make its own safe browsers or portals away from the greater Internet.

“The least we can do is try to find [vulnerabilities] as soon as possible in the process, or if a product is already out, to make sure the company is responsive in fixing it,” he says.

More must-read stories from Fortune:

—What you need to know about 8chan, the controversial site tied to the El Paso shooting

—Verizon’s unlimited plans are getting cheaper. Here’s what you should know

—What CEOs, bankers, and tech execs think about a coming recession

—How an alleged Amazon theft ring got the goods

—Boeing adds a second flight control computer to the 737 MaxCatch up with Data Sheet, Fortune‘s daily digest on the business of tech.

About the Author
By Alyssa Newcomb
See full bioRight Arrow Button Icon

Latest in Tech

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025

Most Popular

Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Finance
Lorem ipsum dolor sit amet, consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore et dolore magna aliqua. Ut enim ad minim veniam
By Fortune Editors
October 20, 2025
Fortune Secondary Logo
Rankings
  • 100 Best Companies
  • Fortune 500
  • Global 500
  • Fortune 500 Europe
  • Most Powerful Women
  • World's Most Admired Companies
  • See All Rankings
  • Lists Calendar
Sections
  • Finance
  • Fortune Crypto
  • Features
  • Leadership
  • Health
  • Commentary
  • Success
  • Retail
  • Mpw
  • Tech
  • Lifestyle
  • CEO Initiative
  • Asia
  • Politics
  • Conferences
  • Europe
  • Newsletters
  • Personal Finance
  • Environment
  • Magazine
  • Education
Customer Support
  • Frequently Asked Questions
  • Customer Service Portal
  • Privacy Policy
  • Terms Of Use
  • Single Issues For Purchase
  • International Print
Commercial Services
  • Advertising
  • Fortune Brand Studio
  • Fortune Analytics
  • Fortune Conferences
  • Business Development
  • Group Subscriptions
About Us
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • About Us
  • Press Center
  • Work At Fortune
  • Terms And Conditions
  • Site Map
  • Facebook icon
  • Twitter icon
  • LinkedIn icon
  • Instagram icon
  • Pinterest icon

Latest in Tech

Goldman Sachs’ tech boss says tracking individual AI usage isn’t useful. He just watches how fast his 12,000 engineers move from idea to production
AIBanks
Goldman Sachs’ tech boss says tracking individual AI usage isn’t useful. He just watches how fast his 12,000 engineers move from idea to production
By Marco Quiroz-GutierrezMay 8, 2026
8 hours ago
hacking
CybersecurityHacking
Student hackers get revenge on final exams as ‘ShinyHunters’ takes down nearly 9,000 schools study software
By Heather Hollingsworth and The Associated PressMay 8, 2026
10 hours ago
Michael Saylor says remarks about selling Bitcoin were intended to jam short-sellers and ‘haters’ 
CryptoBitcoin
Michael Saylor says remarks about selling Bitcoin were intended to jam short-sellers and ‘haters’ 
By Ben WeissMay 8, 2026
10 hours ago
Apple promised a smarter Siri, but a lawsuit says it didn’t deliver—and you can get up to $95 back
LawApple
Apple promised a smarter Siri, but a lawsuit says it didn’t deliver—and you can get up to $95 back
By Catherina GioinoMay 8, 2026
10 hours ago
Fortune 500 Power Moves: Which executives gained and lost power this week
C-SuiteFortune 500 Power Moves
Fortune 500 Power Moves: Which executives gained and lost power this week
By Fortune EditorsMay 8, 2026
11 hours ago
Tired hispanic man in a professional suit feeling sad while waiting for the appointment of a job interview at a recruitment office
EconomyJobs
The job market is healing for everyone—except in the office
By Eva RoytburgMay 8, 2026
11 hours ago

Most Popular

California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
North America
California farmers must destroy 420,000 peach trees after Del Monte closes its canneries and cancels more than $550 million in long-term contracts
By Sasha RogelbergMay 7, 2026
1 day ago
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
Arts & Entertainment
'Blue dot fever' plagues musicians like Post Malone, Meghan Trainor, and Zayn as a growing list of artists cancel tours due to lagging ticket sales
By Dave Lozo and Morning BrewMay 7, 2026
1 day ago
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
Magazine
A Michigan farm town voted down plans for a giant OpenAI-Oracle data center. Weeks later, construction began
By Sharon GoldmanMay 6, 2026
3 days ago
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
Economy
U.S. Treasury will have to borrow $2 trillion this year just to continue functioning—more than $166 billion every month
By Eleanor PringleMay 7, 2026
2 days ago
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
Success
Airbnb CEO Brian Chesky warns two types of people won’t survive the AI era: ‘pure people managers’ and workers who resist change
By Emma BurleighMay 7, 2026
1 day ago
Auto-enrollment in Medicare Advantage isn't a nudge. It's a trap
Commentary
Auto-enrollment in Medicare Advantage isn't a nudge. It's a trap
By Brian KeyserMay 7, 2026
2 days ago

© 2026 Fortune Media IP Limited. All Rights Reserved. Use of this site constitutes acceptance of our Terms of Use and Privacy Policy | CA Notice at Collection and Privacy Notice | Do Not Sell/Share My Personal Information
FORTUNE is a trademark of Fortune Media IP Limited, registered in the U.S. and other countries. FORTUNE may receive compensation for some links to products and services on this website. Offers may be subject to change without notice.