Attacks/Breaches
5/27/2010
10:44 PM
50%
50%

Cisco Warns Of Security Flaws In Building Management System

Multiple vulnerabilities could enable attackers to access power, HVAC, and physical security systems

Cisco Systems yesterday revealed details of multiple security vulnerabilities in a device that many companies use to centrally control building power, ventilation, lighting, and security systems remotely via the data center.

In a security advisory issued Wednesday, Cisco warned users of its Network Building Mediator products to patch the vulnerabilities, which could allow access to obtain administrative passwords and read system configuration files, making it possible for hackers to take control of a building's most critical control systems.

"Successful exploitation of any of these vulnerabilities could result in a malicious user taking complete control over an affected device," the advisory states. The flaws also have been found in older products from Richards-Zeta, the company that originally designed the system, which was acquired by Cisco.

One flaw could enable low-level employees to gain full control of the device by accessing default administrative accounts, Cisco says. Other bugs might allow insiders to intercept traffic as it travels between an administrator and the Building Mediator.

The device, which collects data in a variety of formats and presents it on a single screen, is designed to automate a multitude of facilities management tasks. However, this consolidation could also turn the system into a single point of attack, experts say.

Cisco has released free software updates that address the vulnerabilities. Workarounds that mitigate some of the listed vulnerabilities are also available.

The bugs were discovered during internal testing, and Cisco does not know of any actual expoits yet, the advisory says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-8802
Published: 2015-01-23
The Pie Register plugin before 2.0.14 for WordPress does not properly restrict access to certain functions in pie-register.php, which allows remote attackers to (1) add a user by uploading a crafted CSV file or (2) activate a user account via a verifyit action.

CVE-2014-9623
Published: 2015-01-23
OpenStack Glance 2014.2.x through 2014.2.1, 2014.1.3, and earlier allows remote authenticated users to bypass the storage quote and cause a denial of service (disk consumption) by deleting an image in the saving state.

CVE-2014-9638
Published: 2015-01-23
oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (divide-by-zero error and crash) via a WAV file with the number of channels set to zero.

CVE-2014-9639
Published: 2015-01-23
Integer overflow in oggenc in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (crash) via a crafted number of channels in a WAV file, which triggers an out-of-bounds memory access.

CVE-2014-9640
Published: 2015-01-23
oggenc/oggenc.c in vorbis-tools 1.4.0 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted raw file.

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
If you’re a security professional, you’ve probably been asked many questions about the December attack on Sony. On Jan. 21 at 1pm eastern, you can join a special, one-hour Dark Reading Radio discussion devoted to the Sony hack and the issues that may arise from it.