Attacks/Breaches
5/27/2010
10:44 PM
Connect Directly
RSS
E-Mail
50%
50%

Cisco Warns Of Security Flaws In Building Management System

Multiple vulnerabilities could enable attackers to access power, HVAC, and physical security systems

Cisco Systems yesterday revealed details of multiple security vulnerabilities in a device that many companies use to centrally control building power, ventilation, lighting, and security systems remotely via the data center.

In a security advisory issued Wednesday, Cisco warned users of its Network Building Mediator products to patch the vulnerabilities, which could allow access to obtain administrative passwords and read system configuration files, making it possible for hackers to take control of a building's most critical control systems.

"Successful exploitation of any of these vulnerabilities could result in a malicious user taking complete control over an affected device," the advisory states. The flaws also have been found in older products from Richards-Zeta, the company that originally designed the system, which was acquired by Cisco.

One flaw could enable low-level employees to gain full control of the device by accessing default administrative accounts, Cisco says. Other bugs might allow insiders to intercept traffic as it travels between an administrator and the Building Mediator.

The device, which collects data in a variety of formats and presents it on a single screen, is designed to automate a multitude of facilities management tasks. However, this consolidation could also turn the system into a single point of attack, experts say.

Cisco has released free software updates that address the vulnerabilities. Workarounds that mitigate some of the listed vulnerabilities are also available.

The bugs were discovered during internal testing, and Cisco does not know of any actual expoits yet, the advisory says.

Have a comment on this story? Please click "Discuss" below. If you'd like to contact Dark Reading's editors directly, send us a message. Tim Wilson is Editor in Chief and co-founder of Dark Reading.com, UBM Tech's online community for information security professionals. He is responsible for managing the site, assigning and editing content, and writing breaking news stories. Wilson has been recognized as one ... View Full Bio

Comment  | 
Print  | 
More Insights
Register for Dark Reading Newsletters
White Papers
Flash Poll
Current Issue
Cartoon
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3341
Published: 2014-08-19
The SNMP module in Cisco NX-OS 7.0(3)N1(1) and earlier on Nexus 5000 and 6000 devices provides different error messages for invalid requests depending on whether the VLAN ID exists, which allows remote attackers to enumerate VLANs via a series of requests, aka Bug ID CSCup85616.

CVE-2014-3464
Published: 2014-08-19
The EJB invocation handler implementation in Red Hat JBossWS, as used in JBoss Enterprise Application Platform (EAP) 6.2.0 and 6.3.0, does not properly enforce the method level restrictions for outbound messages, which allows remote authenticated users to access otherwise restricted JAX-WS handlers ...

CVE-2014-3472
Published: 2014-08-19
The isCallerInRole function in SimpleSecurityManager in JBoss Application Server (AS) 7, as used in Red Hat JBoss Enterprise Application Platform (JBEAP) 6.3.0, does not properly check caller roles, which allows remote authenticated users to bypass access restrictions via unspecified vectors.

CVE-2014-3490
Published: 2014-08-19
RESTEasy 2.3.1 before 2.3.8.SP2 and 3.x before 3.0.9, as used in Red Hat JBoss Enterprise Application Platform (EAP) 6.3.0, does not disable external entities when the resteasy.document.expand.entity.references parameter is set to false, which allows remote attackers to read arbitrary files and have...

CVE-2014-3504
Published: 2014-08-19
The (1) serf_ssl_cert_issuer, (2) serf_ssl_cert_subject, and (3) serf_ssl_cert_certificate functions in Serf 0.2.0 through 1.3.x before 1.3.7 does not properly handle a NUL byte in a domain name in the subject's Common Name (CN) field of an X.509 certificate, which allows man-in-the-middle attackers...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Dark Reading continuing coverage of the Black Hat 2014 conference brings interviews and commentary to Dark Reading listeners.