Risk
7/26/2012
12:41 PM
Connect Directly
Google+
LinkedIn
Twitter
RSS
E-Mail
50%
50%

FAA's New Flight Control System Has Security Holes: Researcher

At the Black Hat conference, a computer scientist demonstrates how 'fake airplanes' can be inserted into FAA's upcoming air traffic control system.

Mission Intelligence: NRO's Newest Spy Satellites
Mission Intelligence: NRO's Newest Spy Satellites
(click image for larger view and for slideshow)
A key component of the FAA's emerging "Next Gen" air traffic control system is fundamentally insecure and ripe for manipulation and attack, security researcher Andrei Costin said in a presentation Wednesday at Black Hat 2012 in Las Vegas.

Costin, a computer scientist and graduate student at Eurecom, outlined a series of issues related to the Automatic Dependent Surveillance-Broadcast (ADS-B) system, which is being installed as a replacement to the decades-old ground radar system used to guide airplanes through the sky and on the ground at airports.

Among the threats to ADS-B is that the system lacks a capability for message authentication. "Any attacker can pretend to be an aircraft" by injecting a message into the system, Costin said.

There's also no mechanism in ADS-B for encrypting messages, so messages related to air traffic--including the ability to identify aircraft, their location, and altitude--can be read by virtually anyone, Costin said. He displayed an air traffic screen capture, taken this year, which ostensibly showed the in-flight location of Air Force One, the Boeing 747 used to transport President Obama.

[ Read about the Department of Defenses' plan to let unmanned aircraft share air space with commercial and private planes: Drones To Fly U.S. Skies, In DOD Plans. ]

If the aircraft was in fact Air Force One, the easy availability of that information would have national security implications. "It's a very high-profile target," said Costin. On the other hand, it's possible that the aircraft represented in the screen capture wasn't Air Force One, but another plane identified within ADS-B using Air Force One's registration code. "If the data is false, somebody is spoofing the system," said Costin.

Costin did not provide evidence of any known attacks on ADS-B. Rather, he presented a theoretical scenario in which someone injected the system with data on "fake planes," forcing the air traffic control system to adjust to aircraft that weren't actually in flight. He characterized such an attack at scale--with one million fake planes, for example—as comparable to a denial-of-service attack on the air traffic control system. Air traffic controllers might be forced to block off air space while they sorted out the mess, he said.

Costin demonstrated how an attack on ADS-B could be mounted using inexpensive software-defined radios. He took airplane data that was publicly available from the system, modified the data, and "replayed" the data back to a commercial receiver. "The possibility of injecting fake airplanes is quite easy, just by taking a real message and crafting it to your needs," he said.

There are also privacy issues, because data on private planes can be culled from ADS-B as well. By matching that data with aircraft registration databases, Costin explained, it would be possible to track non-commercial aircraft from city to city.

In a whitepaper accompanying his presentation, Costin wrote that the types of potential attacks on ADS-B range from passive attacks such as eavesdropping to active attacks, including message jamming and injections of the type he demonstrated.

In addition to the lack of encryption in ADS-B, the whitepaper identifies the following security weaknesses: no use of entity authentication as a way of protecting against message injection, or of message signatures to deter tampering; no challenge-response mechanisms to protect against replay attacks; and lack of "ephemeral identifiers" for privacy protection.

Questions over the security of the ADS-B system aren't new. Aviation experts have warned of vulnerabilities in the past, but the FAA has been reluctant to discuss them. In response to InformationWeek, the FAA, in a prepared statement, said it has "a thorough process in place" to identify possible risks to ADS-B, such as intentional jamming, and that it has taken steps to mitigate risks uncovered as part of an ADS-B security action plan. The agency declined to identify the risks it has identified or addressed, calling them "security-sensitive."

"The agency conducts ongoing assessments of ADS-B signal vulnerabilities," according to the statement. The FAA said the contract for the ADS-B ground station network requires ongoing independent validation of the accuracy and reliability of ADS-B and aircraft avionics signals. As a backup to ADS-B, the FAA plans to maintain about half of the current network of secondary radars "in the unlikely event it is needed."

Security information and event monitoring technology has been available for years, but the information can be hard to mine. In our SIEM Success report, we provide a step-by-step guide to make the most of your SIEM system. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Embedded SW Dev
50%
50%
Embedded SW Dev,
User Rank: Apprentice
7/27/2012 | 6:56:52 PM
re: FAA's New Flight Control System Has Security Holes: Researcher
Tracking airplanes from city to city is something which is relatively easy to do now, as private airplanes use their registration numbers with air traffic control, and there are internet sites continuously recording/monitoring air traffic control conversations in real time. Tracking them in-flight can be made more difficult by requesting the FAA block flight tracking because of a security concern, which prevents operations like flightaware from displaying those tail numbers in real-time. The most effective way of preventing traffic is to fly VFR from airports without towers. This hole just prevents the FAA flight tracking block from being effective.

I agree that the other problems need to be addressed, as I really don't want to be flying when the FAA experiences a Denial of Service attack.
PJS880
50%
50%
PJS880,
User Rank: Ninja
7/26/2012 | 7:43:18 PM
re: FAA's New Flight Control System Has Security Holes: Researcher
IG«÷m so very thankful that there is demonstration where they show what exactly the vulnerabilities are in particular systems. FAAG«÷s new flight system, very important system that should have no vulnerabilities what so ever! Being able to simulate planes that are not there and non-encrypted messages regarding flight information, are not vulnerabilities that make me feel safe at all! It doesnG«÷t matter that there is no recorded attacks on this new system, if there is vulnerabilities then there will eventually be an attack if these are not taken care of and eliminated. In addition to all this, these threats are not new, and refused to identify other risks? Does anybody else feel like splitting gas money with me on the next tripG«™road trip!

Paul Sprague
InformationWeek Contributor
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading Tech Digest, Dec. 19, 2014
Software-defined networking can be a net plus for security. The key: Work with the network team to implement gradually, test as you go, and take the opportunity to overhaul your security strategy.
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2014-3971
Published: 2014-12-25
The CmdAuthenticate::_authenticateX509 function in db/commands/authentication_commands.cpp in mongod in MongoDB 2.6.x before 2.6.2 allows remote attackers to cause a denial of service (daemon crash) by attempting authentication with an invalid X.509 client certificate.

CVE-2014-7193
Published: 2014-12-25
The Crumb plugin before 3.0.0 for Node.js does not properly restrict token access in situations where a hapi route handler has CORS enabled, which allows remote attackers to obtain sensitive information, and potentially obtain the ability to spoof requests to non-CORS routes, via a crafted web site ...

CVE-2004-2771
Published: 2014-12-24
The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.

CVE-2014-3569
Published: 2014-12-24
The ssl23_get_client_hello function in s23_srvr.c in OpenSSL 1.0.1j does not properly handle attempts to use unsupported protocols, which allows remote attackers to cause a denial of service (NULL pointer dereference and daemon crash) via an unexpected handshake, as demonstrated by an SSLv3 handshak...

CVE-2014-4322
Published: 2014-12-24
drivers/misc/qseecom.c in the QSEECOM driver for the Linux kernel 3.x, as used in Qualcomm Innovation Center (QuIC) Android contributions for MSM devices and other products, does not validate certain offset, length, and base values within an ioctl call, which allows attackers to gain privileges or c...

Best of the Web
Dark Reading Radio
Archived Dark Reading Radio
Join us Wednesday, Dec. 17 at 1 p.m. Eastern Time to hear what employers are really looking for in a chief information security officer -- it may not be what you think.